Soumettre la recherche
Mettre en ligne
Exploration routing chapter_5
•
Télécharger en tant que PPT, PDF
•
1 j'aime
•
640 vues
Joshua Torres
Suivre
Technologie
Signaler
Partager
Signaler
Partager
1 sur 29
Télécharger maintenant
Recommandé
Exploration routing chapter_4
Exploration routing chapter_4
Joshua Torres
Exploration routing chapter_6
Exploration routing chapter_6
Joshua Torres
Exploration routing chapter_11
Exploration routing chapter_11
Joshua Torres
Exploration Routing Chapter 7
Exploration Routing Chapter 7
jayhawkins
Exploration routing chapter_9
Exploration routing chapter_9
Joshua Torres
Exploration routing chapter_3
Exploration routing chapter_3
Joshua Torres
Exploration routing chapter_10
Exploration routing chapter_10
Joshua Torres
CCNA Exploration 2 - Chapter 5
CCNA Exploration 2 - Chapter 5
Irsandi Hasan
Recommandé
Exploration routing chapter_4
Exploration routing chapter_4
Joshua Torres
Exploration routing chapter_6
Exploration routing chapter_6
Joshua Torres
Exploration routing chapter_11
Exploration routing chapter_11
Joshua Torres
Exploration Routing Chapter 7
Exploration Routing Chapter 7
jayhawkins
Exploration routing chapter_9
Exploration routing chapter_9
Joshua Torres
Exploration routing chapter_3
Exploration routing chapter_3
Joshua Torres
Exploration routing chapter_10
Exploration routing chapter_10
Joshua Torres
CCNA Exploration 2 - Chapter 5
CCNA Exploration 2 - Chapter 5
Irsandi Hasan
CCNA Exploration 2 - Chapter 4
CCNA Exploration 2 - Chapter 4
Irsandi Hasan
Exploration routing chapter_8
Exploration routing chapter_8
Joshua Torres
Exploration routing chapter 4
Exploration routing chapter 4
Sachii Dosti
CCNA Exploration 2 - Chapter 8
CCNA Exploration 2 - Chapter 8
Irsandi Hasan
CCNA Exploration 2 - Chapter 9
CCNA Exploration 2 - Chapter 9
Irsandi Hasan
CCNA Exploration 2 - Chapter 11
CCNA Exploration 2 - Chapter 11
Irsandi Hasan
CCNA Exploration 2 - Chapter 6
CCNA Exploration 2 - Chapter 6
Irsandi Hasan
Exploration routing chapter_2
Exploration routing chapter_2
Joshua Torres
Exploration routing chapter_7
Exploration routing chapter_7
Joshua Torres
Chapter 17 : static routing
Chapter 17 : static routing
teknetir
CCNA Exploration 2 - Chapter 10
CCNA Exploration 2 - Chapter 10
Irsandi Hasan
CCNA3 Verson6 Chapter7
CCNA3 Verson6 Chapter7
Chaing Ravuth
CCNA3 Verson6 Chapter5
CCNA3 Verson6 Chapter5
Chaing Ravuth
CCNAv5 - S2: Chapter 6 Static Routing
CCNAv5 - S2: Chapter 6 Static Routing
Vuz Dở Hơi
CCNA2 Verson6 Chapter3
CCNA2 Verson6 Chapter3
Chaing Ravuth
CCNA Exploration 2 - Chapter 7
CCNA Exploration 2 - Chapter 7
Irsandi Hasan
CCNA3 Verson6 Chapter9
CCNA3 Verson6 Chapter9
Chaing Ravuth
1
1
Wael Walid
CCNA4 Verson6 Chapter3
CCNA4 Verson6 Chapter3
Chaing Ravuth
Methods of sharing
Methods of sharing
dakotabrizzee
Tarea 7
Tarea 7
Abraham Mata
20140222_iodd_in_takizawa
20140222_iodd_in_takizawa
Hiroshi Usui
Contenu connexe
Tendances
CCNA Exploration 2 - Chapter 4
CCNA Exploration 2 - Chapter 4
Irsandi Hasan
Exploration routing chapter_8
Exploration routing chapter_8
Joshua Torres
Exploration routing chapter 4
Exploration routing chapter 4
Sachii Dosti
CCNA Exploration 2 - Chapter 8
CCNA Exploration 2 - Chapter 8
Irsandi Hasan
CCNA Exploration 2 - Chapter 9
CCNA Exploration 2 - Chapter 9
Irsandi Hasan
CCNA Exploration 2 - Chapter 11
CCNA Exploration 2 - Chapter 11
Irsandi Hasan
CCNA Exploration 2 - Chapter 6
CCNA Exploration 2 - Chapter 6
Irsandi Hasan
Exploration routing chapter_2
Exploration routing chapter_2
Joshua Torres
Exploration routing chapter_7
Exploration routing chapter_7
Joshua Torres
Chapter 17 : static routing
Chapter 17 : static routing
teknetir
CCNA Exploration 2 - Chapter 10
CCNA Exploration 2 - Chapter 10
Irsandi Hasan
CCNA3 Verson6 Chapter7
CCNA3 Verson6 Chapter7
Chaing Ravuth
CCNA3 Verson6 Chapter5
CCNA3 Verson6 Chapter5
Chaing Ravuth
CCNAv5 - S2: Chapter 6 Static Routing
CCNAv5 - S2: Chapter 6 Static Routing
Vuz Dở Hơi
CCNA2 Verson6 Chapter3
CCNA2 Verson6 Chapter3
Chaing Ravuth
CCNA Exploration 2 - Chapter 7
CCNA Exploration 2 - Chapter 7
Irsandi Hasan
CCNA3 Verson6 Chapter9
CCNA3 Verson6 Chapter9
Chaing Ravuth
1
1
Wael Walid
CCNA4 Verson6 Chapter3
CCNA4 Verson6 Chapter3
Chaing Ravuth
Tendances
(19)
CCNA Exploration 2 - Chapter 4
CCNA Exploration 2 - Chapter 4
Exploration routing chapter_8
Exploration routing chapter_8
Exploration routing chapter 4
Exploration routing chapter 4
CCNA Exploration 2 - Chapter 8
CCNA Exploration 2 - Chapter 8
CCNA Exploration 2 - Chapter 9
CCNA Exploration 2 - Chapter 9
CCNA Exploration 2 - Chapter 11
CCNA Exploration 2 - Chapter 11
CCNA Exploration 2 - Chapter 6
CCNA Exploration 2 - Chapter 6
Exploration routing chapter_2
Exploration routing chapter_2
Exploration routing chapter_7
Exploration routing chapter_7
Chapter 17 : static routing
Chapter 17 : static routing
CCNA Exploration 2 - Chapter 10
CCNA Exploration 2 - Chapter 10
CCNA3 Verson6 Chapter7
CCNA3 Verson6 Chapter7
CCNA3 Verson6 Chapter5
CCNA3 Verson6 Chapter5
CCNAv5 - S2: Chapter 6 Static Routing
CCNAv5 - S2: Chapter 6 Static Routing
CCNA2 Verson6 Chapter3
CCNA2 Verson6 Chapter3
CCNA Exploration 2 - Chapter 7
CCNA Exploration 2 - Chapter 7
CCNA3 Verson6 Chapter9
CCNA3 Verson6 Chapter9
1
1
CCNA4 Verson6 Chapter3
CCNA4 Verson6 Chapter3
En vedette
Methods of sharing
Methods of sharing
dakotabrizzee
Tarea 7
Tarea 7
Abraham Mata
20140222_iodd_in_takizawa
20140222_iodd_in_takizawa
Hiroshi Usui
Exploration routing chapter_1
Exploration routing chapter_1
Joshua Torres
Resume pritam
Resume pritam
Pritam Warghade
M6.2
M6.2
KittyZZ
Unidad 3
Unidad 3
Oscar Rmz
Next 11 countries
Next 11 countries
Pamela Cisneros Oviedo
LI-FI
LI-FI
hari haran
Ajil mergejil
Ajil mergejil
Adiyasuren Tomorbaatar
MX Fund 01 - Hackers/Founders Co-op Mexico Pitch Deck
MX Fund 01 - Hackers/Founders Co-op Mexico Pitch Deck
Hack Fund V
Diventare famosi con lo stack ELK
Diventare famosi con lo stack ELK
Alfonso Iannotta
drinking
drinking
Daniela Furtuna
Dave Goshorn - Resume
Dave Goshorn - Resume
Dave Goshorn
En vedette
(14)
Methods of sharing
Methods of sharing
Tarea 7
Tarea 7
20140222_iodd_in_takizawa
20140222_iodd_in_takizawa
Exploration routing chapter_1
Exploration routing chapter_1
Resume pritam
Resume pritam
M6.2
M6.2
Unidad 3
Unidad 3
Next 11 countries
Next 11 countries
LI-FI
LI-FI
Ajil mergejil
Ajil mergejil
MX Fund 01 - Hackers/Founders Co-op Mexico Pitch Deck
MX Fund 01 - Hackers/Founders Co-op Mexico Pitch Deck
Diventare famosi con lo stack ELK
Diventare famosi con lo stack ELK
drinking
drinking
Dave Goshorn - Resume
Dave Goshorn - Resume
Similaire à Exploration routing chapter_5
CCNA Exploration 2 - Chapter 2
CCNA Exploration 2 - Chapter 2
Irsandi Hasan
Distance Vector Routing Protocols.ppt
Distance Vector Routing Protocols.ppt
Sunny1710
Chapter_2_CCNA2
Chapter_2_CCNA2
sunabozu
CCNA2 Verson6 Chapter1
CCNA2 Verson6 Chapter1
Chaing Ravuth
CCNA Exploration 2 - Chapter 1
CCNA Exploration 2 - Chapter 1
Irsandi Hasan
Week3 part 2
Week3 part 2
trayyoo
Static Routing
Static Routing
Sachii Dosti
Cisco Router Basic Configuration
Cisco Router Basic Configuration
Prof. Erwin Globio
Day 10.1 enablingrip
Day 10.1 enablingrip
CYBERINTELLIGENTS
CCNA Exploration 2 - Chapter 3
CCNA Exploration 2 - Chapter 3
Irsandi Hasan
CCNA Lab Guide
CCNA Lab Guide
Salachudin Emir
Ccnav5.org ccna 3-v50_final_exam_2014
Ccnav5.org ccna 3-v50_final_exam_2014
Đồng Quốc Vương
CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4
Nil Menon
Chapter 15 : routing concepts
Chapter 15 : routing concepts
teknetir
Exploration_Routing_Chapter_1 ppt for learning Networking
Exploration_Routing_Chapter_1 ppt for learning Networking
brainxMagic
CCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing Concepts
Vuz Dở Hơi
KPUCC-Rs instructor ppt_chapter4_final
KPUCC-Rs instructor ppt_chapter4_final
Fisal Anwari
Chapter 04 - Routing Concepts
Chapter 04 - Routing Concepts
Yaser Rahmati
RIP Routing Information Protocol Extreme Networks
RIP Routing Information Protocol Extreme Networks
Dani Royman Simanjuntak
CCNA Icnd110 s05l05
CCNA Icnd110 s05l05
computerlenguyen
Similaire à Exploration routing chapter_5
(20)
CCNA Exploration 2 - Chapter 2
CCNA Exploration 2 - Chapter 2
Distance Vector Routing Protocols.ppt
Distance Vector Routing Protocols.ppt
Chapter_2_CCNA2
Chapter_2_CCNA2
CCNA2 Verson6 Chapter1
CCNA2 Verson6 Chapter1
CCNA Exploration 2 - Chapter 1
CCNA Exploration 2 - Chapter 1
Week3 part 2
Week3 part 2
Static Routing
Static Routing
Cisco Router Basic Configuration
Cisco Router Basic Configuration
Day 10.1 enablingrip
Day 10.1 enablingrip
CCNA Exploration 2 - Chapter 3
CCNA Exploration 2 - Chapter 3
CCNA Lab Guide
CCNA Lab Guide
Ccnav5.org ccna 3-v50_final_exam_2014
Ccnav5.org ccna 3-v50_final_exam_2014
CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4
Chapter 15 : routing concepts
Chapter 15 : routing concepts
Exploration_Routing_Chapter_1 ppt for learning Networking
Exploration_Routing_Chapter_1 ppt for learning Networking
CCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing Concepts
KPUCC-Rs instructor ppt_chapter4_final
KPUCC-Rs instructor ppt_chapter4_final
Chapter 04 - Routing Concepts
Chapter 04 - Routing Concepts
RIP Routing Information Protocol Extreme Networks
RIP Routing Information Protocol Extreme Networks
CCNA Icnd110 s05l05
CCNA Icnd110 s05l05
Dernier
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Drew Madelung
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Rafal Los
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Delhi Call girls
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
Malak Abu Hammad
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
Enterprise Knowledge
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
Igalia
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
debabhi2
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
Results
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
UK Journal
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Neo4j
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
Enterprise Knowledge
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Delhi Call girls
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
sudhanshuwaghmare1
🐬 The future of MySQL is Postgres 🐘
🐬 The future of MySQL is Postgres 🐘
RTylerCroy
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
wesley chun
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
wesley chun
Dernier
(20)
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
🐬 The future of MySQL is Postgres 🐘
🐬 The future of MySQL is Postgres 🐘
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
Exploration routing chapter_5
1.
RIP version 1 Routing
Protocols and Concepts – Chapter 5 ITE PC v4.0 Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 1
2.
Objectives Describe the functions,
characteristics, and operation of the RIPv1 protocol. Configure a device for using RIPv1. Verify proper RIPv1 operation. Describe how RIPv1 performs automatic summarization. Configure, verify, and troubleshoot default routes propagated in a routed network implementing RIPv1. Use recommended techniques to solve problems related to RIPv1 ITE PC v4.0 Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 2
3.
RIPv1 RIP Characteristics -A
classful, Distance Vector (DV) routing protocol -Metric = hop count -Routes with a hop count > 15 are unreachable -Updates are broadcast every 30 seconds ITE PC v4.0 Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 3
4.
RIPv1 RIP Message
Format RIP header - divided into 3 fields -Command field -Version field -Must be zero Route Entry - composed of 3 fields -Address family identifier -IP address -Metric ITE PC v4.0 Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 4
5.
RIPv1 RIP Operation –RIP
uses 2 message types: Request message -This is sent out on startup by each RIP enabled interface -Requests all RIP enabled neighbors to send routing table Response message -Message sent to requesting router containing routing table ITE PC v4.0 Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 5
6.
RIPv1 IP addresses
initially divided into classes -Class A -Class B -Class C RIP is a classful routing protocol -Does not send subnet masks in routing updates ITE PC v4.0 Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 6
7.
RIPv1 Administrative Distance –RIP’s
default administrative distance is 120 ITE PC v4.0 Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 7
8.
Basic RIPv1 Configuration
A typical topology suitable for use by RIPv1 includes: -Three router set up -No PCs attached to LANs -Use of 5 different IP subnets ITE PC v4.0 Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 8
9.
Basic RIPv1 Configuration
Router RIP Command –To enable RIP enter: -Router rip at the global configuration prompt -Prompt will look like R1(config-router)# ITE PC v4.0 Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 9
10.
Basic RIPv1 Configuration
Specifying Networks –Use the network command to: -Enable RIP on all interfaces that belong to this network -Advertise this network in RIP updates sent to other routers every 30 seconds ITE PC v4.0 Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 10
11.
Verification and Troubleshooting
Show ip Route To verify and troubleshoot routing -Use the following commands: -show ip route -show ip protocols -debug ip rip ITE PC v4.0 Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 11
12.
Verification and Troubleshooting
show ip protocols command -Displays routing protocol configured on router ITE PC v4.0 Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 12
13.
Verification and Troubleshooting
Debug ip rip command -Used to display RIP routing updates as they are happening ITE PC v4.0 Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 13
14.
Verification and Troubleshooting
Passive interface command -Used to prevent a router from sending updates through an interface -Example: Router(config-router)#passive-interface interface-type interface-number ITE PC v4.0 Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 14
15.
Verification and Troubleshooting
Passive interfaces ITE PC v4.0 Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 15
16.
Automatic Summarization Modified Topology
The original scenario has been modified such that: Three classful networks are used: 172.30.0.0/16 192.168.4.0/24 192.168.5.0/24 The 172.30.0.0/16 network is subnetted into three subnets: 172.30.1.0/24 172.30.2.0/24 172.30.3.0/24 ITE PC v4.0 Chapter 1 The following devices are part of the 172.30.0.0/16 classful network address: All interfaces on R1 S0/0/0 and Fa0/0 on R2 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 16
17.
Automatic Summarization Configuration
Details -To remove the RIP routing process use the following command No router rip -To check the configuration use the following command Show run ITE PC v4.0 Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 17
18.
Automatic Summarization Boundary
Routers –RIP automatically summarizes classful networks –Boundary routers summarize RIP subnets from one major network to another. ITE PC v4.0 Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 18
19.
Automatic Summarization Processing RIP
Updates 2 rules govern RIPv1 updates: -If a routing update and the interface it’s received on belong to the same network then The subnet mask of the interface is applied to the network in the routing update -If a routing update and the interface it’s received on belong to a different network then The classful subnet mask of the network is applied to the network in the routing update. ITE PC v4.0 Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 19
20.
Automatic Summarization Sending
RIP Updates –RIP uses automatic summarization to reduce the size of a routing table. ITE PC v4.0 Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 20
21.
Automatic Summarization Advantages
of automatic summarization: -The size of routing updates is reduced -Single routes are used to represent multiple routes which results in faster lookup in the routing table. ITE PC v4.0 Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 21
22.
Automatic Summarization Disadvantage
of Automatic Summarization: -Does not support discontiguous networks ITE PC v4.0 Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 22
23.
Automatic Summarization Discontiguous Topologies
do not converge with RIPv1 A router will only advertise major network addresses out interfaces that do not belong to the advertised route. ITE PC v4.0 Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 23
24.
Default Route and
RIPv1 Modified Topology: Scenario C Default routes Packets that are not defined specifically in a routing table will go to the specified interface for the default route Example: Customer routers use default routes to connect to an ISP router. Command used to configure a default route is ip route 0.0.0.0 0.0.0.0 s0/0/1 ITE PC v4.0 Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 24
25.
Default Route and
RIPv1 ITE PC v4.0 Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 25
26.
Default Route and
RIPv1 Propagating the Default Route in RIPv1 Default-information originate command -This command is used to specify that the router is to originate default information, by propagating the static default route in RIP update. ITE PC v4.0 Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 26
27.
Summary RIP characteristics
include: Classful, distance vector routing protocol Metric is Hop Count Does not support VLSM or discontiguous subnets Updates every 30 seconds Rip messages are encapsulated in a UDP segment with source and destination ports of 520 ITE PC v4.0 Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 27
28.
Summary: Commands used
by RIP Command Command’s purpose Rtr(config)#router rip Enables RIP routing process Rtr(config-router)#network Associates a network with a RIP routing process Rtr#debug ip rip used to view real time RIP routing updates Rtr(config-router)#passive-interface fa0/0 Prevent RIP updates from going out an interface Rtr(config-router)#default-information originate Used by RIP to propagate default routes Rtr#show ip protocols Used to display timers used by RIP ITE PC v4.0 Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 28
29.
ITE PC v4.0 Chapter
1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 29
Télécharger maintenant