USER’S GUIDE

The following table provides the possible choices for IP RIP v2 authentication control

Type

Meaning

 

 

No Authentication *

This control type indicates that IP RIP v1 and

 

unauthenticated IP RIP v2 messages are accepted.

 

 

Simple Password

This control type indicates that IP RIP v1 messages

 

and IP RIP v2 messages which pass authentication

 

test are accepted. The authentication test is done

 

using a simple password.

 

 

* This is the default switch.

IP RIP V2 AUTHENTICATION KEY

If IP RIP is enabled for a specific interface, this key is required if the following condition has been met: the “IP RIP v2 Authentication Control” has been configured with a value other than “No Authentication.” The authentication key is a user-defined password, 1-16 characters in length.

IP RIP HOST ROUTES PROPAGATION SCHEME

If RIP is enabled for a WAN interface, this is required. This controls how the IP RIP packets will be propagated. The default value is “Host Routes Propagation is currently DISABLED.” With the default, WAN local routes are propagated as subnetwork routes. If Host routes propagation is enabled, host routes will be propagated on other network interfaces only while each remote IP device is connected to the CyberSWITCH.

When the IP RIP host propagation scheme is enabled, it will allow multiple systems on the same LAN to work properly. IP RIP information is then advertised as multiple host routes as they connect to the CyberSWITCH.

For more information, refer to the diagrams and explanation provided on WAN interfaces beginning on page 145.

IP NETWORK INTERFACE BACKGROUND INFORMATION

Network Interface is a term used to represent the physical connection of the system to a data network. For example, the Ethernet resource provides a network interface to an Ethernet LAN. The ISDN lines provide network interfaces to multiple remote networks. Because of their switched nature, the ISDN lines provide virtual network interfaces. That is, the same physical ISDN line can actually connect to different remote networks by dialing a different phone number.

A bridge device refers to its network interfaces as ports. It simply forwards packets from one port to another without looking at the network protocol information. A typical ISDN bridge has one Ethernet port and one ISDN port.

In a network that uses the IP protocol for communication, a flexible network interface structure can be implemented. An IP network uses the IP network address as a basis for device communication. IP networks can be segmented into a hierarchical structure by using the subnet addressing provided by the IP protocol. IP hosts can be assigned to a specific subnet based on management and user needs. All IP hosts connected to a virtual or physical subnet must have the same subnet address.

140 CyberSWITCH

Page 140
Image 140
Enterasys Networks CSX7000, CSX5500, CSX6000 manual IP Network Interface Background Information