FortiGate-500 安装和配置指南 2.50

RIP 配置

FortiGate 路由信息协议 (RIP)实现支持 RIP 版本 1 (RFC1058 所定义)和 RIP 版本 2 (也称做 RIP2,RFC2453 所定义)。RIP2 启用了 RIP 消息从而能够承载更多信 息和支持简单的认证。RIP2 也支持 RIP 不支持的子网掩码功能。

RIP 每过一个固定的时间间隔或网络拓扑结构改变时就发送路由更新消息。 当 FortiGate 设备接收到一个包含了改动了的条目的路由表时,它将在自己的路由表上做 相应的改动。FortiGateRIP 表保存着到目的地的最佳路由。在更新完自己的路由表之 后,FortiGate 设备开始发送路由更新以提醒其他网络路由器路由已经改变。您可以配 置 FortiGat RIP 以控制更新的时机。

RIP 使用跳跃统计作为路由度量以衡量一个路由的源网络和目的网络之间的距离。 在路由的路径中的每个跳跃都将被添加到这个路由的度量中。RIP 将一个路径中允许的 最大跳跃数限制为 15 以防止路由循环。这一特性也将 RIP 网络的最大半径限制为 15 个跳跃。

RIP 使用水平分割来防止网络拓扑改变引起的临时路由循环。水平分割可以保证永 远不会将关于路由器的信息发送回它发出的地方。例如,路由器 1 可以告诉路由器 2 它有一个关于网络 A 的路由。路由器 2 通过从路由器 1 获取信息知道了这一事实,所 以当路由器 2 将它自己的更新发送给路由器 1 时,它不会把关于网络 A 的路由更新信 息包括进去。在本例中,如果路由器 1 收到了路由器 2 发送的关于网络 A 的路由信息, 路由器 1 可能会试图使用这一路由去连接网络 A,而不是使用它自己的路由。

RIP 使用计时器来调节性能。一个路由更新计时器控制了两次路由更新之间的时间 间隔。通常这一计时器被设置为 30 秒。每个路由表中的条目都有一个路由超时设置。 当发生路由超时的时候此路由将被标记为无效。无效的路由在路由刷新超时到期之前 将一直保存在路由表中。

RIP 是一个基于 UDP 的协议,它使用 UDP 端口 520 发送和接收数据包。主动的路由 更新消息包含源端口和目的端口,且此两端口都等于 RIP 端口。根据更新请求发出的 更新消息将发送到请求所来自的那个端口。特定的查询可以从除了 RIP 端口外的端口 发出,但是它们必须发送到目的主机的 RIP 端口上。

本章描述了如何配置 FortiGate RIP:

·RIP 设置

·为 FortiGate 接口配置 RIP

·添加 RIP 邻居

·添加 RIP 过滤器

FortiGate-500 安装和配置指南

125

Page 137
Image 137
Fortinet 500 manual 125, 本章描述了如何配置 FortiGate RIP:, ·RIP 设置 ·为 FortiGate 接口配置 RIP ·添加 RIP 邻居 ·添加 RIP 过滤器

500 specifications

Fortinet 500 is a next-generation firewall (NGFW) that is part of Fortinet's acclaimed FortiGate family, designed to provide advanced security for medium to large enterprises. This appliance is known for its high performance, flexibility, and ability to protect networks from a variety of cyber threats through its robust features and technologies.

One of the main features of the Fortinet 500 is its integrated security capabilities. It combines multiple security functions into a single device, allowing organizations to manage everything from intrusion prevention and antivirus to web filtering and application control. This integration leads to simplified management and increased efficiency, as users can address multiple security needs without deploying multiple devices.

The Fortinet 500 runs on the FortiOS operating system, which is known for its simplicity and user-friendliness. FortiOS provides a centralized management interface that allows for the easy configuration and monitoring of security policies across the entire network. Additionally, the Fortinet management tools, such as FortiManager and FortiAnalyzer, enable detailed insights and reporting capabilities, helping organizations stay compliant with their security mandates.

Another characteristic that sets Fortinet 500 apart is its advanced threat intelligence, powered by the FortiGuard Labs. This global threat intelligence system continuously updates the firewall with the latest threat signatures and attack vectors, ensuring that organizations stay ahead of emerging threats. The firewall also employs machine learning and artificial intelligence to detect and mitigate sophisticated attacks in real-time.

Performance is crucial in any security appliance, and the Fortinet 500 does not disappoint. With hardware acceleration and purpose-built security processors, it delivers high throughput levels, enabling organizations to maintain productivity without sacrificing security. This level of performance is particularly beneficial in environments with heavy traffic and bandwidth demands.

In addition to these core features, the Fortinet 500 supports seamless integration with other security solutions within the Fortinet Security Fabric. This comprehensive approach allows for greater visibility and control over the entire security posture of an organization.

Overall, the Fortinet 500 is a powerful NGFW that offers a blend of advanced security features, ease of management, top-notch performance, and robust threat intelligence. Its ability to adapt to the ever-evolving landscape of cybersecurity makes it a valuable asset for businesses seeking to safeguard their digital assets and ensure seamless network operation.