Enterasys Networks CSX7000 Uživatelský manuál Strana 140

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 729
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 139
USER’S GUIDE
140 CyberSWITCH
The following table provides the possible choices for IP RIP v2 authentication control
* This is the default switch.
IP RIP
V2 AUTHENTICATION KEY
If IP RIP is enabled for a specific interface, this key is required if the following condition has been
met: the “IP RIP v2 Authentication Control” has been configured with a value other than “No
Authentication.” The authentication key is a user-defined password, 1-16 characters in length.
IP RIP H
OST ROUTES PROPAGATION SCHEME
If RIP is enabled for a WAN interface, this is required. This controls how the IP RIP packets will be
propagated. The default value is “Host Routes Propagation is currently DISABLED.” With the
default, WAN local routes are propagated as subnetwork routes. If Host routes propagation is
enabled, host routes will be propagated on other network interfaces only while each remote IP
device is connected to the CyberSWITCH.
When the IP RIP host propagation scheme is enabled, it will allow multiple systems on the same
LAN to work properly. IP RIP information is then advertised as multiple host routes as they
connect to the CyberSWITCH.
For more information, refer to the diagrams and explanation provided on WAN interfaces
beginning on page 145.
IP NETWORK INTERFACE BACKGROUND INFORMATION
Network Interface is a term used to represent the physical connection of the system to a data
network. For example, the Ethernet resource provides a network interface to an Ethernet LAN. The
ISDN lines provide network interfaces to multiple remote networks. Because of their switched
nature, the ISDN lines provide virtual network interfaces. That is, the same physical ISDN line can
actually connect to different remote networks by dialing a different phone number.
A bridge device refers to its network interfaces as ports. It simply forwards packets from one port
to another without looking at the network protocol information. A typical ISDN bridge has one
Ethernet port and one ISDN port.
In a network that uses the IP protocol for communication, a flexible network interface structure can
be implemented. An IP network uses the IP network address as a basis for device communication.
IP networks can be segmented into a hierarchical structure by using the subnet addressing
provided by the IP protocol. IP hosts can be assigned to a specific subnet based on management
and user needs. All IP hosts connected to a virtual or physical subnet must have the same subnet
address.
Type Meaning
No Authentication * This control type indicates that IP RIP v1 and
unauthenticated IP RIP v2 messages are accepted.
Simple Password This control type indicates that IP RIP v1 messages
and IP RIP v2 messages which pass authentication
test are accepted. The authentication test is done
using a simple password.
Zobrazit stránku 139
1 2 ... 135 136 137 138 139 140 141 142 143 144 145 ... 728 729

Komentáře k této Příručce

Žádné komentáře