I am Preparing for CCNP and reading Cisco press book (Routing). In EIGRP route filtering by route map concept i read a line written as, "If a clause’s match commands refer to an ACL or prefix list, and the ACL or prefix list matches a route with the deny action, the route is not necessarily filtered. Instead, it just means that route does not match that particular match command and can then be considered by the next route-map clause." I didn't understand the meaning of this line. Please any one explain the meaning of this line with examples.
what the book says is that last word is given to route-map clause action.
access-list 11 permit 10.10.10.0 0.0.0.255
access-list 11 deny 10.10.20.0.0.0.255
route-map example deny 10
match address 11
route-map example 20 permit
With the above configuration the subnet 10.10.10.0/24 matches the permit statement of the ACL in first route-map clause and it is denied, that is is not redistributed or advertised
All other existing subnets are redistributed/advertised including IP subnet 10.10.20.0/24 that is denied by ACL 11 invoked as a match in route-map clause 10. The deny in ACL means only that the subnet is not a match in first route-map clause and processing goes on looking at second route-map clause.
The second route-map clause in this example matches everything so also 10.10.20.0/24 is permitted.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...