Uninformed management stations lose access to the router through Before you enable the Management Plane Protection feature, you should understand the following concepts: Examples of protocols processed in the management plane are . Cisco IOS Security Configuration Guide, Release Chapters in a configuration guide describe protocols, configuration tasks, and . Within Cisco IOS software documentation, the term router is generally used to .. concept of a trusted third party that performs secure verification of users and. Last modified by Deonte R. Carroll on Sep 19, AM. Visibility: Open to anyone. nt Routing Protocols and

Author: Zuludal Akir
Country: Great Britain
Language: English (Spanish)
Genre: Art
Published (Last): 8 March 2014
Pages: 59
PDF File Size: 12.13 Mb
ePub File Size: 6.77 Mb
ISBN: 317-6-58436-954-3
Downloads: 18445
Price: Free* [*Free Regsitration Required]
Uploader: Ketaur

About Affiliates Protofoles Systems, Inc. These network protocols perform a variety of functions required for communication between user applications in source and destination devices, and these functions can differ widely among protocol suites.

If the router knows how to forward the packet, however, it changes the destination physical address to that of the next hop and transmits the packet. Some routing algorithms assume that the source end node will determine the entire route. In the routing loop displayed in Figure: Routing algorithms also are designed to be as simple as possible. The routing update message is one such message that generally consists of all or a scirit of a routing table.

Routing Protocol Authentication Concepts and Configuration

In these algorithms, routers determine the path through the internetwork based on their own calculations. They can provide substantially better throughput and reliability. A – Static routing is configured by the network administrator and is not capable of adjusting to changes in the network without network administrator intervention.

Route information varies depending on the routing algorithm used. If the message indicates that a network change has occurred, the routing software recalculates routes and sends out new routing update messages. Optimality refers to the capability of the routing algorithm to select the best route, which depends on the metrics and metric weightings used to make the calculation.


Regardless of which of these options is selected there are also two different methods of authentication exchange that can be configured for each, these include: For example, one routing algorithm may use a number of hops and delays, but it may weigh delay more heavily in the calculation.

In source-routing systems, routers merely act as store-and-forward devices, mindlessly sending the packet to the next stop. In very large networks, additional hierarchical levels may exist, with routers at the highest hierarchical level forming the routing backbone.

Routing Basics – DocWiki

Once a key chain has been configured, the authentication for EIGRP neighbors is enabled on each interface that is connected to an authenticating neighbor. Step routzge Enter privileged mode. Monitoring these parameters on a continual basis can be resource-intensive itself. The nature of these two algorithm types is different. The idea behind a key chain is rather simple as it simply replicates an electronic version of a key chain, a concept that most people are familiar with.

Routed and routing protocols are discussed in detail later in this book. Path length is the most common routing metric.

In addition, routing algorithms must converge rapidly. One of the methods that can be used to prevent these types of attack is the use of routing protocol authentication. Article is provided courtesy of Cisco Press.

Some sophisticated routing protocols support multiple paths to the same destination. These mappings do not change unless the network administrator alters them. Unlike single-path algorithms, these multipath algorithms permit traffic multiplexing over multiple lines. Link-state protocols are generally more scalable than distance vector protocols.


In essence, link-state algorithms send small updates everywhere, while distance vector algorithms send larger updates only to neighboring routers. Reliability, in the context of routing algorithms, refers to the dependability usually described in conepts of the bit-error rate of each network link.

Using this terminology, network devices without the capability to forward concept between subnetworks are called end systems ESswhereas network devices with these capabilities are called intermediate systems ISs. The integrity of routing information inside a network is of the utmost importance as it can influence how traffic reaches specific destinations.

Routing Basics

Routing algorithms have used many different metrics to determine the best route. Most of the dominant routing algorithms today are dynamic routing algorithms, which adjust to changing network circumstances by analyzing incoming routing update messages. The configuration of authentication with BGP is very simple as it requires only a single configuration command. Routing algorithms that converge slowly can cause routing loops or network outages.

The preceding discussion describes switching between a source and a destination end system. A router of last resort a router to which all unroutable packets are sentfor example, can be designated to act as a repository for all unroutable packets, ensuring that all messages scrit at least handled in some rotage.

In addition, the role of routing protocols is briefly contrasted with the role of routed or network protocols. Keys can also be configured with specific transmit send and receive accept lifetimes that protovoles the ability to have keys automatically change at a predetermined time.