Access lists applied to routing protocols restrict the information sent out in the update and are called distribute lists. They work by omitting certain networks based on the criteria in the access list. The result is that remote routers unaware of these networks are not capable of delivering traffic to them. Networks hidden in this way are typically research-and-development sites, test labs, secure areas, or just unwanted networks. This is also a way to reduce overhead traffic in the network.
Was this article helpful?