Course Details

Previous Page

Cisco ROUTE 2.0: Redistribution Using Distribute and Prefix Lists

Target Audience
Expected Duration
Lesson Objectives
Course Number

Many IP routing challenges can be solved using route redistribution. Having a method to manipulate the redistribution process increases your options and flexibility. There is no one type of route filter that is appropriate for every situation. Therefore, the more techniques that you have at your disposal, the better your chances of solving connectivity challenges. |n To ensure that the network operates efficiently, you often need to control the redistribution process. By implementing filtering mechanisms, you can influence which information is redistributed between different protocols. Controlling the exchange of routing information and routing metrics manipulation enables you to ensure optimal traffic flow within the network. |n After completing this course, you will be able to use distribute lists and prefix lists techniques to manipulate redistribution.

Target Audience
Anyone wishing to obtain real-world routing knowledge, and those that are considering CCNP and CCIP certification. This learning path's discussion of routing could also benefit early CCIE Routing and Switching candidates. Students completing the ROUTE 2.0 learning path should have a solid foundation in routing fundamentals, Cisco IOS basics, and Cisco routing basics. Attending the ICND1 and ICND2 classes or having the CCNA certification will fulfill these expectations.


Expected Duration (hours)

Lesson Objectives

Cisco ROUTE 2.0: Redistribution Using Distribute and Prefix Lists

  • start the course
  • identify the reasons for manipulating redistribution of routing information
  • identify characteristics of distribute lists
  • identify where a distribute list filter can be used
  • recognize how distribute lists for OSPF differ from EIGRP
  • identify the benefits of using prefix lists in comparison to access lists
  • identify how routes are matched using fixed length masks
  • analyze a prefix list configuration
  • identify the function of a prefix operator
  • identify the routes that will be matched given a prefix list using operators
  • configure an ip prefix-list command
  • identify the prefixes that are matched in a given prefix list
  • identify the necessity for reading prefix lists
  • use the greater than or equal to 32 method to determine a prefix match
  • determine what the class of the address range is based on and what the subnet range is
  • use a deny statement to deny a subnet mask
  • Course Number: