IP R
OUTING
17-36
• You can specify the Send Version based on these options:
- Use “RIPv1” or “RIPv2” if all routers in the local network are based
on RIPv1 or RIPv2, respectively.
- Use “RIPv1 Compatible” to propagate route information by
broadcasting to other routers on the network using the RIPv2
advertisement list, instead of multicasting as normally required by
RIPv2. (Using this mode allows RIPv1 routers to receive these
protocol messages, but still allows RIPv2 routers to receive the
additional information provided by RIPv2, including subnet mask,
next hop and authentication information.)
- Use “Do Not Send” to passively monitor route information
advertised by other routers attached to the network.
Loopback Prevention
Just as Layer 2 switches use the Spanning Tree Algorithm to prevent loops,
routers also use methods for preventing loops that would cause endless
retransmission of data traffic. When protocol packets are caught in a loop,
links will be congested, and protocol packets may be lost. However, the
network will slowly converge to the new state. RIP utilizes the following
three methods that can provide faster convergence when the network
topology changes and prevent most loops from occurring:
• Split Horizon – Never propagate routes back to an interface port from
which they have been acquired.
• Poison Reverse – Propagate routes back to an interface port from which
they have been acquired, but set the distance-vector metrics to infinity.
(This provides faster convergence.)
• Triggered Updates – Whenever a route gets changed, broadcast an
update message after waiting for a short random delay, but without
waiting for the periodic cycle.
Protocol Message Authentication
RIPv1 is not a secure protocol. Any device sending protocol messages
from UDP port 520 will be considered a router by its neighbors. Malicious
or unwanted protocol messages can be easily propagated throughout the
network if no authentication is required. RIPv2 supports authentication via
Summary of Contents for WPCI-G - annexe 1
Page 2: ......
Page 26: ...TABLE OF CONTENTS xxvi ...
Page 36: ...GETTING STARTED ...
Page 72: ...MANAGING SYSTEM FILES 2 24 ...
Page 74: ...SWITCH MANAGEMENT ...
Page 90: ...CONFIGURING THE SWITCH 3 16 ...
Page 245: ...SHOWING PORT STATISTICS 8 33 Figure 8 12 Port Statistics ...
Page 252: ...ADDRESS TABLE SETTINGS 9 6 ...
Page 318: ...CLASS OF SERVICE 12 16 ...
Page 330: ...QUALITY OF SERVICE 13 12 ...
Page 348: ...DOMAIN NAME SERVICE 15 8 ...
Page 404: ...IP ROUTING 17 44 ...
Page 406: ...COMMAND LINE INTERFACE ...
Page 608: ...MIRROR PORT COMMANDS 26 4 ...
Page 644: ...SPANNING TREE COMMANDS 29 28 ...
Page 668: ...VLAN COMMANDS 30 24 ...
Page 686: ...CLASS OF SERVICE COMMANDS 31 18 ...
Page 700: ...QUALITY OF SERVICE COMMANDS 32 14 ...
Page 792: ...IP INTERFACE COMMANDS 36 50 ...
Page 818: ...APPENDICES ...
Page 824: ...SOFTWARE SPECIFICATIONS A 6 ...
Page 828: ...TROUBLESHOOTING B 4 ...
Page 844: ...INDEX Index 6 ...
Page 845: ......