Solved

route-map match ip address

Posted on 2004-11-02
217 Views
Last Modified: 2010-04-10
This is just something I'm trying to understand.

I know that in a route-map, if I use a match statement that uses and access-list, the source/destination of the packet is easily checked against the access-list, such as:

match ip address 10

where 10 is an access-list and since it's a standard access-list it's examining the source address of the packet.

But what about his:

match ip address 192.168.10.50

Is this looking for a match on the SOURCE address of the packet or the DESTINATION address of the packet?

And how do we know?

I can't find this documented in Cisco.

0
Question by:gateguard
    4 Comments
     
    LVL 5

    Expert Comment

    by:Big5250
    Here's a link to Cisco on Configuring PBR (Policy-Based Routing)  Should be able to provide you with direction.  If not, let me know.
    0
     
    LVL 11

    Accepted Solution

    by:
    If you wanted to direct routing based on the destination address of a packet, you could just put in a static route.  Policy-Based Routing is for cases where that's not sufficient, such as where you want to treat different sources differently.  So I'd say that if that syntax works at all (the access-list form is the usual approach), it should match the source address.

    0
     

    Author Comment

    by:gateguard
    PennGwyn, I've only seen that syntax in reference material, never on an actual router.  You're probably right about what it does and you're certainly right that the access-list form is the usual (and best) approach.

    But just out of curiousity, Big5250, could you post the link.  (There's no link.)

    Thanks.
    0
     
    LVL 5

    Assisted Solution

    by:Big5250
    0

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone. Privacy Policy Terms of Use

    Featured Post

    Top 6 Sources for Identifying Threat Actor TTPs

    Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

    Suggested Solutions

    Overview This article describes how to silently install Adobe Reader on multiple workstations, customize the installation options (accept EULA, remove desktop shortcut etc) using the Adobe Customization Wizard and install Adobe Reader font packs an…
    Some time ago I was asked to set up a web portal PC to put at our entrance. When customers arrive, they could see a webpage 'promoting' our company. So I tried to set up a windows 7 PC as a kiosk PC.......... I will spare you all the annoyances I…
    After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
    After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

    860 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    14 Experts available now in Live!

    Get 1:1 Help Now