Configuring and Managing IP Routes
109
A destination can be a subnet or network. If two static routes specify a
destination, the more specific route is always chosen (longest prefix
match). For example, if you have a static route with a destination of
10.10.1.0/24, and another static route with a destination of
10.10.0.0/16, the first static route is chosen to reach 10.10.1.15, because
it has the longer prefix match.
If the IP route table contains an explicit route for a given destination, MSS
uses the route. Otherwise, MSS uses a default route. For example, if the
route table does not have a route to host 192.168.1.10, the WX switch
uses the default route to forward a packet addressed to that host. 3Com
recommends that you configure at least one default route.
You can configure a maximum of four routes per destination. This
includes default routes, which have destination 0.0.0.0/0. Each route to a
given destination must have a unique gateway address. When the route
table contains multiple default routes or multiple explicit routes to the
same destination, MSS uses the route with the lowest metric (cost for
using the route). If two or more routes to the same destination have the
lowest cost, MSS selects the first route in the route table.
MSS can use a route only if the route is resolved by a direct route on one
of the WX switch’s VLANs.
Before you add a static route, use the
display interface
command to
verify that the switch has an IP interface in the same subnet as the route’s
default router (gateway). MSS requires the routes for the interface to
resolve the static route. If the switch does not have an interface in the
default router’s subnet, the static route cannot be resolved and the
VLAN:Interface field of the
display ip route
command output shows
that the static route is down.
Summary of Contents for 3CRWX120695A
Page 138: ...138 CHAPTER 6 CONFIGURING AND MANAGING IP INTERFACES AND SERVICES ...
Page 272: ...272 CHAPTER 11 CONFIGURING RF LOAD BALANCING FOR MAPS ...
Page 310: ...310 CHAPTER 13 CONFIGURING USER ENCRYPTION ...
Page 322: ...322 CHAPTER 14 CONFIGURING RF AUTO TUNING ...
Page 350: ...350 CHAPTER 16 CONFIGURING QUALITY OF SERVICE ...
Page 368: ...368 CHAPTER 17 CONFIGURING AND MANAGING SPANNING TREE PROTOCOL ...
Page 412: ...412 CHAPTER 19 CONFIGURING AND MANAGING SECURITY ACLS ...
Page 518: ...518 CHAPTER 21 CONFIGURING AAA FOR NETWORK USERS ...
Page 530: ...530 CHAPTER 22 CONFIGURING COMMUNICATION WITH RADIUS ...
Page 542: ...542 CHAPTER 23 MANAGING 802 1X ON THE WX SWITCH ...
Page 598: ...598 CHAPTER 26 ROGUE DETECTION AND COUNTERMEASURES ...
Page 706: ...706 GLOSSARY ...