In this course the student will learn important skill of how to use Prefix-list and filter unwanted routes from the routing tables. This skill will also help the student to keep the routing tables clean in an organization, thus keeping the network safe from malicious injected networks.
Follow the author as he goes through the steps below
1. Building Topology to simulate a routing between three routers.
2. The instructor will go through the classes of networks which will show how to identify networks using subnet mask.
3. Four cases are created that will show step by step filtering of the routes using Prefix-lists.
4. Case 1 will have a scenario of filtering a network using source address and mask.
5. Case 2 will have a scenario of allowing routes that are class A but not subnetted.
6. Case 3 will have a scenario of allowing routes that are class B but not subnetted.
7. Case 4 will have a scenario of allowing routes that are class C but no subnetted.
The instructor is going to build the lab step by step and wishes to have the students to mimic the lab in their own simulator and follow the steps as the network is built. The course is practical in nature and is suitable for anyone who has access to routers and can follow the steps in this course.
Welcome to the course and lets start learning.