beautypg.com

Ip network interface background information, Ip network interface background information 140 – Enterasys Networks CSX6000 User Manual

Page 140

background image

USER’S GUIDE

140 CyberSWITCH

The following table provides the possible choices for IP RIP v2 authentication control

* This is the default switch.

IP RIP

V

2 A

UTHENTICATION

K

EY

If IP RIP is enabled for a specific interface, this key is required if the following condition has been
met: the “IP RIP v2 Authentication Control” has been configured with a value other than “No
Authentication.” The authentication key is a user-defined password, 1-16 characters in length.

IP RIP H

OST

R

OUTES

P

ROPAGATION

S

CHEME

If RIP is enabled for a WAN interface, this is required. This controls how the IP RIP packets will be
propagated. The default value is “Host Routes Propagation is currently DISABLED.” With the
default, WAN local routes are propagated as subnetwork routes. If Host routes propagation is
enabled, host routes will be propagated on other network interfaces only while each remote IP
device is connected to the CyberSWITCH.

When the IP RIP host propagation scheme is enabled, it will allow multiple systems on the same
LAN to work properly. IP RIP information is then advertised as multiple host routes as they
connect to the CyberSWITCH.

For more information, refer to the diagrams and explanation provided on WAN interfaces
beginning on

page 145

.

IP N

ETWORK

I

NTERFACE

B

ACKGROUND

I

NFORMATION

Network Interface is a term used to represent the physical connection of the system to a data
network. For example, the Ethernet resource provides a network interface to an Ethernet LAN. The
ISDN lines provide network interfaces to multiple remote networks. Because of their switched
nature, the ISDN lines provide virtual network interfaces. That is, the same physical ISDN line can
actually connect to different remote networks by dialing a different phone number.

A bridge device refers to its network interfaces as ports. It simply forwards packets from one port
to another without looking at the network protocol information. A typical ISDN bridge has one
Ethernet port and one ISDN port.

In a network that uses the IP protocol for communication, a flexible network interface structure can
be implemented. An IP network uses the IP network address as a basis for device communication.
IP networks can be segmented into a hierarchical structure by using the subnet addressing
provided by the IP protocol. IP hosts can be assigned to a specific subnet based on management
and user needs. All IP hosts connected to a virtual or physical subnet must have the same subnet
address.

Type

Meaning

No Authentication *

This control type indicates that IP RIP v1 and
unauthenticated IP RIP v2 messages are accepted.

Simple Password

This control type indicates that IP RIP v1 messages
and IP RIP v2 messages which pass authentication
test are accepted. The authentication test is done
using a simple password.

This manual is related to the following products: