Hello List!
Quick question
for you.
In this task,
we have to stop autorp info leaking into neighbouring BGP ASNs.
The solutions
guide uses this idea:
ip
access-list extended STOPRP
deny ip any
224.0.1.39
deny ip any
224.0.1.40
permit ip any
int serx/x/x
decr Border
interface to another AS.
ip access-group
STOPRP in
ip access-group
STOPRP out
ip pim
send-rp-announce loo 0 scope 5
ip pim
send-rp-disc loo 0 scope 5
I went down the
"ip multicast boundary <ACL> filter auto-rp" route, which I
take to be equally valid. That is not my question. Remember the old
CCNA rule: outbound ACLs filter traffic flowing through a router, but not
originated by the router? Well, if the router in the above scenario is RP
and the mapping agent, would that outbound ACL actually stop the autorp traffic
as it is being originated by the router itself?
George.
_______________________________________________
For more information regarding industry leading CCIE Lab training, please visit
www.ipexpert.com
Are you a CCNP or CCIE and looking for a job? Check out
www.PlatinumPlacement.com
http://onlinestudylist.com/mailman/listinfo/ccie_rs