Rip key chains – RuggedCom RuggedRouter RX1100 User Manual

Page 179

Advertising
background image

17. Configuring Dynamic Routing

Revision 1.14.3

179

RX1000/RX1100™

The Distance field sets the administrative distance to use for all routes unless overridden by other
distance settings.

The Redistribute Connected fields control distribution of connected routes. When enabled, RIP will
advertise routes to directly connected interfaces to other RIP routers in the area. Normally only routes
that fall within the scope of the network areas will be advertised.

The Redistribute Static fields control the distribution of static routes. When enabled, RIP will
advertise static routes created using the Network Configuration / Routing and Default Route menu
to other RIP routers in the area. Normally only routes that fall within the scope of the network areas
will be advertised.

The Redistribute Kernel fields control distribution of kernel routes. When enabled, RIP will advertise
routes from the kernel routing table, which includes static routes entered by the administrator, to other
RIP routers in the area. Normally only routes that fall within the scope of the network areas will be
advertised.

The Redistribute OSPF fields control distribution of routes learned by OSPF. When enabled, RIP
will advertise routes learned by OSPF.

The Redistribute BGP fields control distribution of routes learned by BGP. When enabled, RIP will
advertise routes learned by BGP.

The Passive Default option controls the default active/passive state of new interfaces. When enabled
all new interfaces will be passive by default. The passive state of individual interfaces is controlled
from the RIP Interfaces configuration.

The Update timer field controls how often RIP sends out routing table updates.

The Timeout Timer field controls how long information stays in the routing table after it is received
without an update.

The Garbage Collection Timer field controls how long expired entries are remembered before being
purged.

17.2.5.2. RIP Key Chains

The Key Chains table configures authentication keys used on the interfaces. By defining the keys in
a key chain, the same settings can be applied to multiple groups of interfaces. Without key chains the
same settings would have to be entered for each interface separately.

Key chains also allow multiple keys to be entered in a single key chain with a start time for when that
key should become valid as well as the duration the key is valid. This allows multiple keys to be set
up with automatic transitions from one key to the next over time.

A key consists of a key string, which is the value used for authentication. It also has the optional lifetime
to accept RIP messages with the key, and the optional lifetime to send RIP messages with that key.

Advertising