Export-Source; Route-Filter; Authentication - HP procurve 8100fl series Management And Configuration Manual

Hide thumbs Also See for procurve 8100fl series:
Table of Contents

Advertisement

Export-Source

This component specifies the source of the exported routes. It can also specify
the metric to be associated with the routes exported from this source.
The routes to be exported can be identified by their associated attributes:
Their protocol type (RIP, OSPF, Static, Connected).
Interface or the gateway from which the route was received.
Tag associated with a route. Both OSPF and RIP version 2 currently
support tags. All other protocols have a tag of zero.
In some cases, a combination of the associated attributes can be specified to
identify the routes to be exported.

Route-Filter

This component specifies the individual routes which are to exported or
restricted. The metric to be associated with these routes can also be explicitly
specified using this component.
The metric associated with the exported routes are inherited unless explicitly
specified. If there is no metric specified with a route-filter, then the metric is
inherited from the one specified with the export-source.
If a metric was not explicitly specified with both the route-filter and the export-
source, then it is inherited from the one specified with the export-destination.
Every protocol (RIP and OSPF) has a configurable parameter that specifies
the default-metric associated with routes exported to that protocol. If a metric
is not explicitly specified with the route-filter, export-source as well as export-
destination, then it is inherited from the default-metric associated with the
protocol to which the routes are being exported.

Authentication

Authentication guarantees that routing information is only imported from
trusted routers. Many protocols like RIP V2 and OSPF provide mechanisms
for authenticating protocol exchanges. A variety of authentication schemes
can be used. Authentication has two components – an Authentication Method
and an Authentication Key. Many protocols allow different authentication
methods and keys to be used in different parts of the network.
Configuring Routing Policies

Authentication

14-5

Advertisement

Table of Contents
loading

Table of Contents