Route filtering by using the distribute-list objective: 1: skillfully Configure route redistribution 2: filter the corresponding route using the distribute-list 1: Specific configuration R1! EnableConf thostname Londonno ip domain-lookline cons 0no exec-timelogg sync! Interface Loopback0ip address 172.16.1.1 255.255.255.0! Interface Loopback1ip address 172.16.2.1 255.255.255.0! Interface Loopback2ip address 172.16.3.1 255.255.255.0! Interface Loopback3ip address 172.16.4.1 255.255.255.0! Interface Loopback4ip address 172.16.5.1 255.255.255.0! Interface Loopback5ip address 172.16.6.1 255.255.255.0! Interface Loopback6ip address 172.16.7.1 255.255.255.0! Interface Loopback7ip address 172.16.8.1 255.255.255.0! Interface loopback 8Ip add 1.1.1.1 255.255.255.255! Interface Serial1ip address 10.1.1.1 255.255.252no sh! Router ospf 1router-id 1.1.1.1network 0.0.0.0 255.255.255.255 area 0! End: configure the interfaces of the vro as required, enable ospf, and advertise all networks to ospf, which belongs to area0. R13! EnableConf thostname Florenceno ip domain-lookline cons 0no exec-timelogg sync! Int loo 0Ip add 2.2.2.2 255.255.255.255! Interface Serial1ip address 10.1.1.2 255.255.255.252clockrate 64000no sh! Interface Serial0ip address 10.1.1.6 255.255.255.252clockrate 64000no sh! Router VPN 50no autonetwork 10.1.1.6 0.0.0.0redistribute ospf 1 metric 10000 100 255 1 1500 (advertise ospf to ospf) distribute-list 12 out ospf 1 (define which routes will be filtered) auto-summary! Router ospf 1router-id 2.2.2.2network 10.1.1.2 0.0.0.0 area 0 redistribute VPN 50 subnets (re-distributing the ospf to ospf) distribute-list 11 out China (filtering the routes sent to the ospf )! Access-list 11 permit 192.168.1.0 0.0.255) access-list 11 permit 192.168.3.0 0.0.255access-list 11 permit 192.168.5.0 0.0.0.255access-list 11 permit 192.168.7.0 0.0.0.255access-list 12 deny 172.16.2.0 0.0.0.255 (which routes are blocked from being published) access-list 12 deny 172.16.4.0 0.0.0.255access-list 12 deny 172.16.6.0 0.0.0.255access-list 12 deny 172.16.8.0 0.0.255access-list 12 permit any! End: configure the interfaces of the vro as required. Then, Use ospf and ospf to advertise the corresponding network to the area0 and ospf interfaces of ospf, the routing is also filtered out using distribute-list in the Process of ospf and ospf respectively. You can view the route table and acl table to determine which routes are blocked and which are allowed to be advertised. R3! EnableConf thostname Denverno ip domain-lookupline cons 0no exec-timelogg sync! Interface Loopback0ip address 192.168.1.1 255.255.255.0! Interface Loopback1ip address 192.168.2.1 255.255.255.0! Interface Loopback2ip address 192.168.3.1 255.255.255.0! Interface Loopback3ip address 192.168.4.1 255.255.255.0! Interface Loopback4ip address 192.168.5.1 255.255.255.0interface Loopback5ip address 192.168.6.1 255.255.255.0! Interface Loopback6ip address 192.168.7.1 255.255.255.0! Interface Loopback7ip address 192.168.8.1 255.255.255.0! Interface Serial1ip address 10.1.1.5 255.255.255.252no sh! Router VPN 50no auto-summarynetwork 0.0.0.0! End: configure the interfaces of the vroeigrp as required. Then, use the VPN gateway to advertise all interfaces to the vroeigrp network. 1: Check whether the route entry specified by the route table is filtered. 2. Think about how to use only one command in the acl to perform parity filtering.