BLADE OS™ Application Guide HP GbE2c Ethernet Blade Switch for c-Class BladeSystem Version 5.1 Advanced Functionality Software
Table Of Contents
- Contents
- Figures
- Tables
- Preface
- Part 1: Basic Switching
- Accessing the Switch
- The Management Network
- Local Management Using the Console Port
- The Command Line Interface
- Remote Management Access
- Client IP Address Agents
- Securing Access to the Switch
- Setting Allowable Source IP Address Ranges
- RADIUS Authentication and Authorization
- TACACS+ Authentication
- LDAP Authentication and Authorization
- Secure Shell and Secure Copy
- Configuring SSH/SCP Features on the Switch
- Configuring the SCP Administrator Password
- Using SSH and SCP Client Commands
- SSH and SCP Encryption of Management Messages
- Generating RSA Host and Server Keys for SSH Access
- SSH/SCP Integration with Radius Authentication
- SSH/SCP Integration with TACACS+ Authentication
- End User Access Control
- Ports and Trunking
- Port-Based Network Access Control
- VLANs
- Spanning Tree Protocol
- RSTP and MSTP
- Link Layer Discovery Protocol
- Quality of Service
- Accessing the Switch
- Part 2: IP Routing
- Basic IP Routing
- Routing Information Protocol
- IGMP
- OSPF
- OSPF Overview
- OSPF Implementation in BLADE OS
- OSPF Configuration Examples
- Remote Monitoring
- Part 3: High Availability Fundamentals
- High Availability
- Layer 2 Failover
- Server Link Failure Detection
- VRRP Overview
- Failover Methods
- BLADE OS Extensions to VRRP
- Virtual Router Deployment Considerations
- High Availability Configurations
- High Availability
- Part 4: Appendices
- Index
BLADE OS 5.1 Application Guide
180 Chapter 10: Routing Information Protocol BMD00113, September 2009
Default
The RIP router can listen and supply a default route, usually represented as 0.0.0.0 in the routing
table. When a router does not have an explicit route to a destination network in its routing table, it
uses the default route to forward those packets.
Metric
The metric field contains a configurable value between 1 and 15 (inclusive) which specifies the
current metric for the interface. The metric value typically indicates the total number of hops to the
destination. The metric value of 16 represents an unreachable destination.
Authentication
RIPv2 authentication uses plain text password for authentication. If configured using
Authentication password, then it is necessary to enter an authentication key value.
The following method is used to authenticate a RIP message:
If the router is not configured to authenticate RIPv2 messages, then RIPv1 and unauthenticated
RIPv2 messages are accepted; authenticated RIPv2 messages are discarded.
If the router is configured to authenticate RIPv2 messages, then RIPv1 messages and RIPv2
messages which pass authentication testing are accepted; unauthenticated and failed
authentication RIPv2 messages are discarded.
For maximum security, RIPv1 messages are ignored when authentication is enabled
(cfg/l3/rip/if <x>/auth/password); otherwise, the routing information from
authenticated messages is propagated by RIPv1 routers in an unauthenticated manner.