Chapter 18
| Unicast Routing
Configuring the Routing Information Protocol
– 665 –
multicasting as normally required by RIPv2. (Using this mode allows older
RIPv2 routers which only receive RIP broadcast messages to receive all of
the information provided by RIPv2, including subnet mask, next hop and
authentication information. (This is the default setting.)
■
Use “Do Not Send” to passively monitor route information advertised by
other routers attached to the network.
◆
The Receive Version can be specified based on these options:
■
Use “RIPv1” or “RIPv2” if all routers in the local network are based on RIPv1
or RIPv2, respectively.
■
Use “RIPv1 and RIPv2” if some routers in the local network are using RIPv2,
but there are still some older routers using RIPv1. (This is the default
setting.)
■
Use “Do Not Receive” if dynamic entries are not required to be added to the
routing table for an interface. (For example, when only static routes are to
be allowed for a specific interface.)
Protocol Message Authentication
RIPv1 is not a secure protocol. Any device sending protocol messages from UDP
port 520 will be considered a router by its neighbors. Malicious or unwanted
protocol messages can be easily propagated throughout the network if no
authentication is required.
RIPv2 supports authentication using a simple password or MD5 key encryption.
When a router is configured to exchange authentication messages, it will insert the
password into all transmitted protocol packets, and check all received packets to
ensure that they contain the authorized password. If any incoming protocol
messages do not contain the correct password, they are simply dropped.
For authentication to function properly, both the sending and receiving interface
must be configured with the same password or authentication key.
Loopback Prevention
Just as Layer 2 switches use the Spanning Tree Algorithm to prevent loops, routers
also use methods for preventing loops that would cause endless retransmission of
data traffic. When protocol packets are caught in a loop, links will be congested,
and protocol packets may be lost. However, the network will slowly converge to the
new state. RIP supports several methods which can provide faster convergence
when the network topology changes and prevent most loops from occurring.
Parameters
These parameters are displayed:
◆
VLAN ID
– Layer 3 VLAN interface. This interface must be configured with an IP
address and have an active link. (Range: 1-4094)
Summary of Contents for GTL-2881
Page 34: ...Section I Getting Started 34 ...
Page 48: ...Section II Web Configuration 48 Unicast Routing on page 651 ...
Page 151: ...Chapter 4 Interface Configuration VLAN Trunking 151 Figure 69 Configuring VLAN Trunking ...
Page 152: ...Chapter 4 Interface Configuration VLAN Trunking 152 ...
Page 230: ...Chapter 8 Congestion Control Automatic Traffic Control 230 ...
Page 596: ...Chapter 14 Multicast Filtering Multicast VLAN Registration for IPv6 596 ...
Page 620: ...Chapter 15 IP Configuration Setting the Switch s IP Address IP Version 6 620 ...
Page 672: ...Section III Appendices 672 ...
Page 678: ...Appendix A Software Specifications Management Information Bases 678 ...
Page 688: ...Appendix C License Statement GPL Code Statement Notification of Compliance 688 ...
Page 696: ...Glossary 696 ...
Page 706: ...GTL 2881 GTL 2882 E112016 ST R01 ...