The document discusses configuring dynamic and static routing on a Cisco ASDM device. It covers:
1. Configuring static routes and dynamic routing protocols like OSPF, RIP, and EIGRP through the ASDM interface.
2. Dynamic routing is only available in routed firewall mode, while static routes can be configured in both routed and transparent modes.
3. Topics covered include configuring dynamic routing processes and areas, static routes, route summarization, and proxy ARPs.
The document discusses static routing and key concepts related to router configuration and operation. It defines static routes as manually configured paths that specify how a router will transmit packets to certain networks. The summary describes how to configure static routes, default routes, and route summarization. It also outlines tools for troubleshooting routing issues like missing routes.
The document discusses dynamic routing and the Routing Information Protocol (RIP). It provides details on RIP including that it is a distance vector protocol that uses hop count as its metric. RIP routers exchange their full routing tables every 30 seconds and routers learn routes to networks that are up to 15 hops away. The document also includes configuration examples for RIP on routers in a sample network topology connecting the cities of Hyderabad, Chennai, and Bangalore.
Dynamic routing protocols have several advantages over static routing, including not requiring knowledge of destination networks and automatically updating topology changes. RIP, OSPF, and EIGRP are examples of dynamic interior gateway protocols (IGPs) that are commonly used within autonomous systems to exchange routing information between neighbor routers. EIGRP is a proprietary Cisco protocol that has fast convergence and includes features from both distance vector and link state routing protocols.
This document discusses static and dynamic routing. It begins by defining static routing as manually configured routes that cannot automatically react to network changes. Dynamic routing protocols allow routers to share network information and automatically find alternate paths if the primary path fails. The document then covers key concepts for dynamic routing, including autonomous systems, interior routing protocols used within an autonomous system, and exterior routing protocols used between autonomous systems. Metrics and algorithms used by routing protocols to determine the best path are also discussed.
Dynamic Routing All Algorithms, Working And BasicsHarsh Mehta
This document provides information on computer networks and routing protocols. It discusses advantages and problems of computer networks. It then describes the Enhanced Interior Gateway Routing Protocol (EIGRP) and some of its key features like security, congestion handling, efficiency, and support for IPv4 and IPv6. It also discusses static and dynamic routing, different routing metrics, and compares EIGRP to other routing protocols like RIP, OSPF, and IS-IS.
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNP nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
Dynamic routing allows routes to change dynamically according to network changes. Routing protocols are used to find networks and update router tables. Some common routing protocols discussed are RIP, IGRP, OSPF, IS-IS, and EIGRP. Advantages of dynamic routing include not needing to know destination networks, advertising directly connected networks, dynamically updating topology changes, reduced administration, and suitability for large organizations. Disadvantages include initial complexity, less security from broadcast updates, and requiring additional resources.
Router is a networking device that connects different networks and selects the best path to forward packets between them. It operates at the network layer of the OSI model. Cisco is the leading router manufacturer, making 70% of the market. Routers come in different sizes for different uses - access routers for small networks, distribution routers for ISPs, and core routers for backbone networks. Static routing requires manually configuring routes, while dynamic routing uses protocols to share route information between routers automatically.
The document discusses static routing and key concepts related to router configuration and operation. It defines static routes as manually configured paths that specify how a router will transmit packets to certain networks. The summary describes how to configure static routes, default routes, and route summarization. It also outlines tools for troubleshooting routing issues like missing routes.
The document discusses dynamic routing and the Routing Information Protocol (RIP). It provides details on RIP including that it is a distance vector protocol that uses hop count as its metric. RIP routers exchange their full routing tables every 30 seconds and routers learn routes to networks that are up to 15 hops away. The document also includes configuration examples for RIP on routers in a sample network topology connecting the cities of Hyderabad, Chennai, and Bangalore.
Dynamic routing protocols have several advantages over static routing, including not requiring knowledge of destination networks and automatically updating topology changes. RIP, OSPF, and EIGRP are examples of dynamic interior gateway protocols (IGPs) that are commonly used within autonomous systems to exchange routing information between neighbor routers. EIGRP is a proprietary Cisco protocol that has fast convergence and includes features from both distance vector and link state routing protocols.
This document discusses static and dynamic routing. It begins by defining static routing as manually configured routes that cannot automatically react to network changes. Dynamic routing protocols allow routers to share network information and automatically find alternate paths if the primary path fails. The document then covers key concepts for dynamic routing, including autonomous systems, interior routing protocols used within an autonomous system, and exterior routing protocols used between autonomous systems. Metrics and algorithms used by routing protocols to determine the best path are also discussed.
Dynamic Routing All Algorithms, Working And BasicsHarsh Mehta
This document provides information on computer networks and routing protocols. It discusses advantages and problems of computer networks. It then describes the Enhanced Interior Gateway Routing Protocol (EIGRP) and some of its key features like security, congestion handling, efficiency, and support for IPv4 and IPv6. It also discusses static and dynamic routing, different routing metrics, and compares EIGRP to other routing protocols like RIP, OSPF, and IS-IS.
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNP nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
Dynamic routing allows routes to change dynamically according to network changes. Routing protocols are used to find networks and update router tables. Some common routing protocols discussed are RIP, IGRP, OSPF, IS-IS, and EIGRP. Advantages of dynamic routing include not needing to know destination networks, advertising directly connected networks, dynamically updating topology changes, reduced administration, and suitability for large organizations. Disadvantages include initial complexity, less security from broadcast updates, and requiring additional resources.
Router is a networking device that connects different networks and selects the best path to forward packets between them. It operates at the network layer of the OSI model. Cisco is the leading router manufacturer, making 70% of the market. Routers come in different sizes for different uses - access routers for small networks, distribution routers for ISPs, and core routers for backbone networks. Static routing requires manually configuring routes, while dynamic routing uses protocols to share route information between routers automatically.
cintains basic modes of router ,sub-modes , set line/login password in ccna, how to assign ip address, configure telnet , break router password ,.. etc
This document discusses static routing concepts and configuration. It covers implementing static and default routes for IPv4 and IPv6, as well as summarization, floating static routes, and troubleshooting. The objectives are to explain static routing advantages/disadvantages, configure different static route types, implement CIDR and VLSM, and troubleshoot common issues. Configuration examples are provided for various static route scenarios.
The document provides information on configuring Cisco routers, including:
- Cisco IOS software uses different command modes to access groups of commands, including user EXEC, privileged EXEC, and configuration modes.
- IP addresses, routing protocols, and other settings are configured in privileged EXEC or configuration modes using commands like interface, ip address, router rip/ospf/eigrp, and more.
- Router and link status can be checked using LED indicators on ports and transceiver modules.
The document discusses routing and routing protocols. It defines routing as the process routers use to forward packets toward their destination network based on the destination IP address. It describes static routing, where network administrators manually configure routes, as well as dynamic routing protocols, where routers automatically share information to build and update routing tables. It outlines common routing protocols including RIP, IGRP, EIGRP, OSPF, and BGP and their key characteristics such as the metrics and timers they use.
Dynamic routing protocols allow networks to keep routing tables up to date as the network changes over time. There are two main types of dynamic routing protocols: link-state protocols and vector-distance protocols. Link-state protocols have advantages like ensuring all routers converge on the same routing tables and generating less network traffic compared to vector-distance protocols. Common dynamic routing protocols include RIP, OSPF, IS-IS, and BGP.
The document discusses router configuration in Packet Tracer. It describes how Packet Tracer can be used to illustrate basic network concepts in real time. It then covers the key components of a router, including common vendors, port types, and configuration modes. The remainder of the document provides step-by-step instructions for configuring a simple static routing scenario between two routers to connect two networks.
Router configuration involves configuring the components of a router like RAM, NVRAM, flash memory, interfaces, and ROM. RAM stores routing tables and caches. NVRAM stores the startup configuration. Flash memory stores the IOS image. Interfaces connect routers to networks. Dynamic routing protocols like RIP, IGRP, OSPF, and EIGRP can be configured to exchange routing information. Static routes can also be configured using the ip route command. Troubleshooting commands help monitor router operation and troubleshoot issues.
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERSanilinvns
The document provides an introduction to Cisco IOS and routers. It discusses that Cisco IOS runs on most Cisco routers and is responsible for carrying out network protocols, connecting traffic between devices, adding security, and ensuring network reliability. It also describes how routers can connect different network types and the internal and external components of routers. It explains how to connect to routers through the console, auxiliary, or Telnet sessions and brings up topics like router memory, configurations, and IOS images.
Routing protocols allow routers to communicate and exchange information that helps determine the best path between networks. The main types are static routing, where routes are manually configured, and dynamic routing, where routes are automatically updated as network conditions change. Common dynamic routing protocols include RIP, IGRP, EIGRP, and OSPF, which use different algorithms and metrics like hop count or bandwidth to calculate the best routes.
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNP nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
The chapter discusses IP routing and routing protocols. It explains the goals of routing which include stability, robustness, dynamic path updates, and secure information transmission. It also covers routing metrics, interior and exterior routing protocols, static and dynamic routing, routing tables, and the Routing Information Protocol (RIP). RIP uses hop count as its metric and supports up to 15 hops between routers. Enhancements in RIPv2 include multicast updates, triggered updates, classless operation, and authentication.
Cisco IOS is the operating system that controls routing and switching functions on Cisco networking devices. It allows routers and switches to function by running configuration files that control traffic flow. Understanding Cisco IOS is essential for network administrators to properly configure and manage Cisco devices on their networks.
The document provides an overview of the Open Shortest Path First (OSPF) routing protocol, including that it is an interior gateway protocol that uses link state routing to establish neighbor relationships and exchange routing information within an autonomous system in order to determine the shortest path between any two routers on a network. OSPF detects changes in network topology quickly and converges on a new loop-free routing structure within seconds, and it has been widely implemented in large enterprise networks to provide efficient routing.
Day 3 ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)anilinvns
This document provides an overview of the Enhanced Interior Gateway Routing Protocol (EIGRP) and Open Shortest Path First (OSPF) routing protocols. It describes the key characteristics of EIGRP including that it is a hybrid routing protocol that uses metrics like bandwidth and delay to determine the best path. It also explains how to configure and verify EIGRP. For OSPF, the document outlines that it is an open standard link-state protocol, defines common OSPF terminology, and describes how to configure OSPF areas and verify the protocol. Loopback interfaces and troubleshooting OSPF are also briefly covered.
networking and their Routing protocols with commands along with diagram ,(rip, IGRP and OSPF and BGP ) and knowledge about Network devices like Router and Switch. network define and definitions of Lan, router and all the routing protocols and their features.
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNA, nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
Internet Routing Protocols: Fundamental Concepts of Distance-Vector and Link-...Vishal Sharma, Ph.D.
This document discusses internet routing protocols and provides an overview of distance vector and link state routing. It begins by outlining the talk and explaining the importance of routing in the internet. It then describes the routing process at a router and how routers build routing tables by exchanging information with routing protocols. The document proceeds to illustrate the operation of distance vector routing, including how routers calculate and update their routing tables. It notes some drawbacks of distance vector routing, such as slow convergence after topology changes and problems with unequal link costs. Finally, it provides examples of how these drawbacks, like counting to infinity and bouncing effects, can occur.
RIP (Routing Information Protocol) is a standard routing protocol that exchanges routing information between gateways and hosts. It works by limiting routes to a maximum of 15 hops to prevent routing loops. There are three versions of RIP: RIP version 1 supports only classful routing; RIP version 2 adds support for VLSM and authentication; and RIPng extends RIP version 2 to support IPv6. RIP has limitations such as a small hop count limit and slow convergence times. It is commonly implemented in Cisco IOS, Junos, and open source routing software.
The document provides information about IP routing, including static and dynamic routing. It discusses:
- The basics of routing including destination addresses, neighbor routers, routes, and maintaining routing information.
- The benefits and disadvantages of static routing, including less overhead but requiring manual configuration.
- Dynamic routing protocols like RIP, IGRP, and OSPF that automatically share routing information.
- Configuring and verifying static routes, as well as troubleshooting connection issues.
- Key aspects of distance vector protocols like RIP and IGRP, including updates, loops, metrics, and timers.
Design and Implementation of Dynamic Routing in Wireless NetworksSatish Reddy
This document summarizes a student's research on designing and implementing dynamic routing in wireless networks. It discusses several dynamic routing algorithms including SPRA, ECMP, AODV, and proposes a new algorithm called DDRA. DDRA aims to improve security and throughput by routing consecutive packets along different paths instead of the same path. Evaluation shows DDRA has less path similarity, higher throughput, and is less vulnerable to attacks like eavesdropping compared to other algorithms. The document also covers related topics like routing methods, protocols, and a security-enhanced routing table design.
Labmeeting - 20150512 - New Secure Routing Method & Applications Facing MitM ...Syuan Wang
This document proposes a new secure routing method using graph theory to route network traffic across multiple paths to mitigate man-in-the-middle attacks. It represents computer networks as graphs and develops an algorithm called pathFinder to choose secure path combinations based on criteria like safety, speed and buffer size. The method finds two paths between a source and destination with equal weight or calculates a ratio of traffic loads across two unequal weight paths to balance security and performance. A simulation confirmed the approach does not significantly impact router performance. Further optimization is needed to scale to larger networks and select only the most secure paths.
cintains basic modes of router ,sub-modes , set line/login password in ccna, how to assign ip address, configure telnet , break router password ,.. etc
This document discusses static routing concepts and configuration. It covers implementing static and default routes for IPv4 and IPv6, as well as summarization, floating static routes, and troubleshooting. The objectives are to explain static routing advantages/disadvantages, configure different static route types, implement CIDR and VLSM, and troubleshoot common issues. Configuration examples are provided for various static route scenarios.
The document provides information on configuring Cisco routers, including:
- Cisco IOS software uses different command modes to access groups of commands, including user EXEC, privileged EXEC, and configuration modes.
- IP addresses, routing protocols, and other settings are configured in privileged EXEC or configuration modes using commands like interface, ip address, router rip/ospf/eigrp, and more.
- Router and link status can be checked using LED indicators on ports and transceiver modules.
The document discusses routing and routing protocols. It defines routing as the process routers use to forward packets toward their destination network based on the destination IP address. It describes static routing, where network administrators manually configure routes, as well as dynamic routing protocols, where routers automatically share information to build and update routing tables. It outlines common routing protocols including RIP, IGRP, EIGRP, OSPF, and BGP and their key characteristics such as the metrics and timers they use.
Dynamic routing protocols allow networks to keep routing tables up to date as the network changes over time. There are two main types of dynamic routing protocols: link-state protocols and vector-distance protocols. Link-state protocols have advantages like ensuring all routers converge on the same routing tables and generating less network traffic compared to vector-distance protocols. Common dynamic routing protocols include RIP, OSPF, IS-IS, and BGP.
The document discusses router configuration in Packet Tracer. It describes how Packet Tracer can be used to illustrate basic network concepts in real time. It then covers the key components of a router, including common vendors, port types, and configuration modes. The remainder of the document provides step-by-step instructions for configuring a simple static routing scenario between two routers to connect two networks.
Router configuration involves configuring the components of a router like RAM, NVRAM, flash memory, interfaces, and ROM. RAM stores routing tables and caches. NVRAM stores the startup configuration. Flash memory stores the IOS image. Interfaces connect routers to networks. Dynamic routing protocols like RIP, IGRP, OSPF, and EIGRP can be configured to exchange routing information. Static routes can also be configured using the ip route command. Troubleshooting commands help monitor router operation and troubleshoot issues.
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERSanilinvns
The document provides an introduction to Cisco IOS and routers. It discusses that Cisco IOS runs on most Cisco routers and is responsible for carrying out network protocols, connecting traffic between devices, adding security, and ensuring network reliability. It also describes how routers can connect different network types and the internal and external components of routers. It explains how to connect to routers through the console, auxiliary, or Telnet sessions and brings up topics like router memory, configurations, and IOS images.
Routing protocols allow routers to communicate and exchange information that helps determine the best path between networks. The main types are static routing, where routes are manually configured, and dynamic routing, where routes are automatically updated as network conditions change. Common dynamic routing protocols include RIP, IGRP, EIGRP, and OSPF, which use different algorithms and metrics like hop count or bandwidth to calculate the best routes.
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNP nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
The chapter discusses IP routing and routing protocols. It explains the goals of routing which include stability, robustness, dynamic path updates, and secure information transmission. It also covers routing metrics, interior and exterior routing protocols, static and dynamic routing, routing tables, and the Routing Information Protocol (RIP). RIP uses hop count as its metric and supports up to 15 hops between routers. Enhancements in RIPv2 include multicast updates, triggered updates, classless operation, and authentication.
Cisco IOS is the operating system that controls routing and switching functions on Cisco networking devices. It allows routers and switches to function by running configuration files that control traffic flow. Understanding Cisco IOS is essential for network administrators to properly configure and manage Cisco devices on their networks.
The document provides an overview of the Open Shortest Path First (OSPF) routing protocol, including that it is an interior gateway protocol that uses link state routing to establish neighbor relationships and exchange routing information within an autonomous system in order to determine the shortest path between any two routers on a network. OSPF detects changes in network topology quickly and converges on a new loop-free routing structure within seconds, and it has been widely implemented in large enterprise networks to provide efficient routing.
Day 3 ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)anilinvns
This document provides an overview of the Enhanced Interior Gateway Routing Protocol (EIGRP) and Open Shortest Path First (OSPF) routing protocols. It describes the key characteristics of EIGRP including that it is a hybrid routing protocol that uses metrics like bandwidth and delay to determine the best path. It also explains how to configure and verify EIGRP. For OSPF, the document outlines that it is an open standard link-state protocol, defines common OSPF terminology, and describes how to configure OSPF areas and verify the protocol. Loopback interfaces and troubleshooting OSPF are also briefly covered.
networking and their Routing protocols with commands along with diagram ,(rip, IGRP and OSPF and BGP ) and knowledge about Network devices like Router and Switch. network define and definitions of Lan, router and all the routing protocols and their features.
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNA, nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
Internet Routing Protocols: Fundamental Concepts of Distance-Vector and Link-...Vishal Sharma, Ph.D.
This document discusses internet routing protocols and provides an overview of distance vector and link state routing. It begins by outlining the talk and explaining the importance of routing in the internet. It then describes the routing process at a router and how routers build routing tables by exchanging information with routing protocols. The document proceeds to illustrate the operation of distance vector routing, including how routers calculate and update their routing tables. It notes some drawbacks of distance vector routing, such as slow convergence after topology changes and problems with unequal link costs. Finally, it provides examples of how these drawbacks, like counting to infinity and bouncing effects, can occur.
RIP (Routing Information Protocol) is a standard routing protocol that exchanges routing information between gateways and hosts. It works by limiting routes to a maximum of 15 hops to prevent routing loops. There are three versions of RIP: RIP version 1 supports only classful routing; RIP version 2 adds support for VLSM and authentication; and RIPng extends RIP version 2 to support IPv6. RIP has limitations such as a small hop count limit and slow convergence times. It is commonly implemented in Cisco IOS, Junos, and open source routing software.
The document provides information about IP routing, including static and dynamic routing. It discusses:
- The basics of routing including destination addresses, neighbor routers, routes, and maintaining routing information.
- The benefits and disadvantages of static routing, including less overhead but requiring manual configuration.
- Dynamic routing protocols like RIP, IGRP, and OSPF that automatically share routing information.
- Configuring and verifying static routes, as well as troubleshooting connection issues.
- Key aspects of distance vector protocols like RIP and IGRP, including updates, loops, metrics, and timers.
Design and Implementation of Dynamic Routing in Wireless NetworksSatish Reddy
This document summarizes a student's research on designing and implementing dynamic routing in wireless networks. It discusses several dynamic routing algorithms including SPRA, ECMP, AODV, and proposes a new algorithm called DDRA. DDRA aims to improve security and throughput by routing consecutive packets along different paths instead of the same path. Evaluation shows DDRA has less path similarity, higher throughput, and is less vulnerable to attacks like eavesdropping compared to other algorithms. The document also covers related topics like routing methods, protocols, and a security-enhanced routing table design.
Labmeeting - 20150512 - New Secure Routing Method & Applications Facing MitM ...Syuan Wang
This document proposes a new secure routing method using graph theory to route network traffic across multiple paths to mitigate man-in-the-middle attacks. It represents computer networks as graphs and develops an algorithm called pathFinder to choose secure path combinations based on criteria like safety, speed and buffer size. The method finds two paths between a source and destination with equal weight or calculates a ratio of traffic loads across two unequal weight paths to balance security and performance. A simulation confirmed the approach does not significantly impact router performance. Further optimization is needed to scale to larger networks and select only the most secure paths.
This document discusses the differences between dynamic and static languages. It asks what dynamic languages are, how they differ from static languages, and when each type of language should be used. It also notes that the discussion should not argue about which type is right or wrong, but rather focus on understanding the differences between the two approaches.
The document discusses the difference between static and dynamic websites, with static websites delivering pre-stored content to users while dynamic websites are generated by web applications and can include user interaction and generated content. Some disadvantages of static websites mentioned include chaotic homepages, cryptic navigation, lack of calls-to-action and unoriginal photos. The document asks for ideas on how to leverage social media to transform static websites into more dynamic ones.
This article studies the effects of dynamic and static stretching on power and agility performance. 30 military cadets performed 5-step jump, medicine ball throw, and T-drill tests after doing dynamic stretching, static stretching, or no warm up. Results showed dynamic stretching led to better performance than static stretching or no warm up in all tests. Specifically, static stretching negatively impacted medicine ball throw results. The article concludes that dynamic stretching is more beneficial for athletic performance than static stretching.
Dynamic routing is necessary for large networks to automatically update routing tables when network changes occur. However, dynamic routing introduces security problems that need to be addressed. The document discusses static and dynamic routing, routing tables, common routing algorithms, and the need for a new secure routing algorithm that can adapt to topology changes while protecting sensitive network information from hackers.
Routing, Different types of forwarding techniquerajib_
This document discusses different types of routing including direct, indirect, static, and dynamic routing. It describes the fields in a routing table including mask, network address, next hop address, interface, and others. Finally, it explains how routing tables are populated with routing information and provides an example routing table for a router.
In this networking presentation, we have covered NAT and classful Sub netting and classless sub netting using IPv4 address. we find number of hosts,total networks,first valid IP address, Last Valid Ip Address,Host ID,Network ID
DSDV is a proactive routing protocol that uses destination sequence numbers to ensure loop-free routing in mobile ad hoc networks. Each node maintains a routing table with destination addresses, next hops, metrics, and sequence numbers. Nodes periodically broadcast their full routing tables, and also broadcast updates immediately after changes to avoid counting to infinity problems. DSDV aims to limit unnecessary route advertisements through a mechanism to dampen fluctuations in routing tables.
Dijkstra's algorithm is used to find the shortest paths from a source node to all other nodes in a network. It works by marking all nodes as tentative with initial distances from the source set to 0 and others to infinity. It then extracts the closest node, adds it to the shortest path tree, and relaxes distances of its neighbors. This process repeats until all nodes are processed. When applied to the example network, Dijkstra's algorithm finds the shortest path from node A to all others to be A-B=4, A-C=6, A-D=8, A-E=7, A-F=7, A-G=7, and A-H=9.
This document provides an overview of IP addressing and subnetting. It discusses IP address format, classful and classless addressing, subnetting, VLSM, and provides an example of using VLSM to allocate addresses to subnets of varying sizes from a single class C network. The key topics covered are IP address format, routing with classful vs classless addressing, how subnetting divides a network into smaller subnets, and how VLSM allows variable length subnet masks for flexible address allocation.
This document discusses shortest path algorithms. It begins with the Konigsberg bridge problem solved by Euler that helped develop graph theory. It then discusses the shortest path problem in graph theory and two algorithms to solve it: Dijkstra's algorithm and the A* search algorithm. It explains how these algorithms work and their applications, such as in map routing, network routing, games development, and more.
Chapter 6: Objectives
-----------------------------------------------
Explain the advantages and disadvantages of static routing.
Explain the purpose of different types of static routes.
Configure IPv4 and IPv6 static routes by specifying a next-hop address.
Configure an IPv4 and IPv6 default routes.
Explain the use of legacy classful addressing in network implementation.
Explain the purpose of CIDR in replacing classful addressing.
Design and implement a hierarchical addressing scheme.
Configure an IPv4 and IPv6 summary network address to reduce the number of routing table updates.
Configure a floating static route to provide a backup connection.
Explain how a router processes packets when a static route is configured.
Troubleshoot common static and default route configuration issues.
Yaser Rahmati | یاسر رحمتی
Rahmati Academy | آکادمی رحمتی
www.yaser-rahmati.ir
www.rahmati-academy.ir
The document discusses IPv4 and IPv6 addressing. It covers the following topics for IPv4 addresses: they are 32-bit addresses that uniquely identify devices; notation formats (binary, dotted-decimal); address space of 232; classes A-E; classful vs classless addressing; subnet masking; and network address translation (NAT). It also discusses IPv6 addresses: they are 128-bit to address depletion issues; notation formats (hexadecimal, abbreviated); and address types/prefixes (unicast, multicast, etc.).
The document discusses various network layer services and routing algorithms. It describes packet switching which allows packets to be forwarded using destination addresses and connection-oriented services which require call setup and use virtual circuit identifiers. It also summarizes different routing algorithms including flooding, distance vector, link state, hierarchical routing, multicast routing, and routing for mobile and ad hoc networks.
A router is a networking device that forwards data packets between computer networks. It has multiple network interfaces and uses information in routing tables to determine the best path to direct each packet. As a packet comes in one of its lines, the router reads the address and uses its routing information to determine the next network. This allows it to effectively direct traffic through multiple interconnected networks until packets reach their destination. Router technology has evolved alongside increases in network bandwidth, allowing networks to expand while also driving down costs over time.
IP addressing and subnetting allows networks to be logically organized and divided. The key objectives covered include explaining IP address classes, configuring addresses, subnetting networks, and advanced concepts like CIDR, summarization, and VLSM. Transitioning to IPv6 is also discussed as a way to address the depletion of IPv4 addresses and improve security.
Routers connect different computer networks and forward data packets between them by reading the address information in each packet to determine the ultimate destination. A router contains a routing table with information about connected networks and uses this to determine the best path for packets to travel through multiple networks to reach their destination. There are two main types of routers: core routers connect different cities while edge routers connect users and hosts to networks.
OSPF is an Interior Gateway Protocol that supports IP routing. It allows for packet authentication, IP multicast when sending and receiving packets, and supports IP subnetting and tagging of external routes. Cisco supports OSPF Version 2 and the OSPF MIB, which provides management information related to OSPF routing protocols. The document provides information on configuring OSPF, including defining different network types, route redistribution, and area parameters.
The document provides an overview of single-area OSPF concepts, including:
- OSPF is a link-state routing protocol that uses areas and exchanges routing information via packet types including Hello, DBD, LSR, LSU, and LSAck.
- OSPF builds three databases using these packets: the neighbor table using Hellos, the topology table using the LSDB, and the routing table using the forwarding database.
- OSPF elects a DR and BDR on multiaccess networks to reduce flooding of LSAs, with the DR being the point for receiving and sending all LSAs for that network.
OSPF is an IGP routing protocol used to distribute routing information within an autonomous system. The document discusses configuring OSPF, including:
1. Configuring OSPF interface parameters such as cost, hello interval, dead interval, and authentication.
2. Specifying the OSPF network type as either broadcast, nonbroadcast multiaccess, or point-to-multipoint.
3. For nonbroadcast networks, explicitly configuring neighbors using the neighbor command.
The document provides instructions on configuring various OSPF parameters and features, including:
1. Configuring OSPF interface parameters such as cost, authentication, priority, and timers.
2. Configuring different OSPF network types like broadcast, non-broadcast, and point-to-multipoint.
3. Configuring OSPF areas including authentication, stub areas, and assigning costs. Also covers configuring Not So Stubby Areas (NSSA).
4. Configuring route summarization between OSPF areas and when redistributing routes.
5. Additional configuration topics like virtual links, default routes, route calculation timers, and monitoring OSPF.
The document provides instructions on configuring various OSPF parameters and features, including:
1. Configuring OSPF interface parameters such as cost, authentication, priority, and timers.
2. Configuring different OSPF network types like broadcast, non-broadcast, and point-to-multipoint.
3. Configuring OSPF areas including authentication, stub areas, and assigning costs. Features like NSSA and route summarization between areas are also described.
4. Additional OSPF configurations covered include virtual links, default routes, route calculation timers, and redistribution of routes into OSPF. Monitoring and troubleshooting OSPF is also mentioned.
This document discusses configuring and troubleshooting single-area OSPF routing. It covers topics like:
- Configuring static and dynamic routing on distribution and core routers
- Configuring and verifying single-area OSPF
- Designated router election process for multiaccess networks
- Propagating default static routes in OSPF
- Securing OSPF with message digest 5 authentication
- Components of troubleshooting single-area OSPF like forming adjacencies and transitioning states
The document describes single-area OSPF concepts including its features, operation, and packet types. It explains that OSPF is a link-state routing protocol that establishes neighbor adjacencies to exchange routing information. It uses five packet types: Hello, DBD, LSR, LSU, and LSAck. Routers progress through several states as they discover each other and synchronize databases to reach the Full state where routing tables are fully converged.
This document provides an overview of single-area OSPF concepts, including:
- OSPF is a link-state routing protocol that uses areas and exchanges link-state advertisements between routers to build routing tables.
- There are five types of OSPF packets (Hello, DBD, LSR, LSU, LSAck) that are used in the routing process.
- OSPF routers progress through seven states (Down, Init, Two-Way, ExStart, Exchange, Loading, Full) to establish neighbor relationships and synchronize routing information.
- Open Shortest Path First (OSPF) is a link-state routing protocol that can be used for both small and large networks. It uses areas and hierarchical network design to reduce routing overhead and improve performance as the network scales.
- OSPF establishes neighbor relationships to exchange routing information. It elects a Designated Router and Backup Designated Router to optimize this exchange on multi-access networks. Link-state databases are synchronized between neighbors to calculate the shortest paths.
- Basic OSPF configuration involves enabling OSPF on interfaces and networks, setting authentication, and adjusting metrics and timers. Loopback interfaces ensure router IDs remain stable. Verification commands display neighbor relationships and routing tables.
The document discusses Open Shortest Path First (OSPF) routing protocol. It covers basic OSPF configuration, establishing OSPF neighbor relationships, OSPF message types, OSPF operation overview including building the routing table, and optimizing OSPF adjacencies on multiaccess networks. The key aspects are electing a designated router and backup designated router to reduce routing update traffic and ensure synchronized link-state databases across all routers.
The document discusses configuring single-area OSPFv2 in point-to-point networks. It describes using the network command to enable OSPF on interfaces matching a network address and wildcard mask. Alternatively, OSPF can be configured directly on interfaces using the ip ospf command. Passive interfaces are used to prevent sending unnecessary routing updates on LAN links. Point-to-point networks are configured to disable DR/BDR election when only two routers connect an interface. Loopbacks can also be used as point-to-point networks.
The document discusses configuring single-area OSPFv2 in point-to-point networks. It describes using the network command to enable OSPF on interfaces matching a network address and wildcard mask. Alternatively, OSPF can be configured directly on interfaces using the ip ospf command. Passive interfaces are described to prevent unnecessary routing updates on interfaces. The network type is changed to point-to-point to disable DR/BDR election for links with only two routers. Loopbacks can also be used as point-to-point networks.
This document provides an overview of a seminar presentation on Open Shortest Path First (OSPF) routing protocol. The presentation covers the basic concepts of OSPF including its use of the Shortest Path First algorithm, areas, router types, header format, and hello packets. It also gives examples of OSPF configuration and important terms like loopback interfaces, designated routers, and authentication. The summary highlights both the processor intensive nature of OSPF but also its advantages like hierarchy, link state design, and support for VLSM.
The document discusses configuring single-area OSPFv2 in point-to-point networks. It describes using the network command to enable OSPF on interfaces based on their IP addresses and wildcard masks. Specifying the exact interface IP address with a quad zero wildcard mask is an alternative. The ip ospf command can also be used to directly configure OSPF on interfaces and associate them with an area. The area ID is typically 0 for single-area OSPFv2 configurations.
OSPFv3 is an extension of OSPFv2 for IPv6 networks. Key differences include OSPFv3 running per link instead of per subnet, using link-local addresses, supporting multiple instances per link, identifying neighbors by router ID instead of IP address, removing authentication from packet headers, and expanding LSA flooding scope and handling unknown LSAs. OSPFv3 also introduces new packet formats, options field, and LSA types while keeping common concepts such as areas, link state database, and SPF algorithm from OSPFv2.
Layer 3 Protocols
This document provides an overview of various layer 3 protocols and techniques, including routing protocols (BGP, IS-IS, OSPF, RIP), multicasting protocols (IGMP), and loop avoidance techniques. It describes the purpose and key features of each protocol. BGP exchanges routing information between autonomous systems. IS-IS and OSPF are intra-AS routing protocols that use link-state algorithms. RIP is a distance vector protocol best suited to small networks. IGMP manages multicast group membership. NDP provides address resolution and neighbor discovery for IPv6. HIP separates host identity from IP addresses to enable mobility.
Relatore: Alessandro Legnani, Cisco CCIE e IP Network Architect di IT Global Consulting Srl
Sintesi e sinergia perfetta di un nuovo protocollo di routing (e non solo) con il caro vecchio e robusto IPsec (senza le problematiche ike). Perché inventarsi l’ennesima forma di tunnelig per il data plane?
Quanto sopra è la chiave del successo della soluzione sdwan Cisco/Viptela che la rende enormemente scalabile e unica sul mercato.
Dynamic routing protocols are used to automatically discover remote networks, maintain up-to-date routing information, and choose the best path to destination networks. There are two main types - interior gateway protocols (IGPs) like RIP, OSPF, and EIGRP that are used within an autonomous system, and exterior protocols like BGP that route between autonomous systems. IGPs use metrics like hop count or bandwidth to determine the best path. OSPF is a link-state protocol that floods link information, while EIGRP uses DUAL algorithm and maintains topology tables for fast convergence.
This document provides an overview of OSPF and EIGRP routing protocols including how they work, configure, and troubleshoot. It describes key concepts such as how OSPF uses the Dijkstra algorithm to calculate the shortest path and elect designated routers, and how EIGRP uses the DUAL algorithm and has characteristics of both distance vector and link state protocols. It also provides configuration examples and show commands for setting up and monitoring OSPF and EIGRP routing.
OSPF is a routing protocol for Internet Protocol (IP) networks. It uses a link state routing (LSR) algorithm and falls into the group of interior routing protocols, operating within a single autonomous system (AS). It is defined as OSPF Version 2 for IPv4. The updates for IPv6 are specified as OSPF Version 3. OSPF is perhaps the most widely used interior gateway protocol (IGP) in large enterprise networks.
Similar to Configuring dynamic and static routing (20)
Post init hook in the odoo 17 ERP ModuleCeline George
In Odoo, hooks are functions that are presented as a string in the __init__ file of a module. They are the functions that can execute before and after the existing code.
Get Success with the Latest UiPath UIPATH-ADPV1 Exam Dumps (V11.02) 2024yarusun
Are you worried about your preparation for the UiPath Power Platform Functional Consultant Certification Exam? You can come to DumpsBase to download the latest UiPath UIPATH-ADPV1 exam dumps (V11.02) to evaluate your preparation for the UIPATH-ADPV1 exam with the PDF format and testing engine software. The latest UiPath UIPATH-ADPV1 exam questions and answers go over every subject on the exam so you can easily understand them. You won't need to worry about passing the UIPATH-ADPV1 exam if you master all of these UiPath UIPATH-ADPV1 dumps (V11.02) of DumpsBase. #UIPATH-ADPV1 Dumps #UIPATH-ADPV1 #UIPATH-ADPV1 Exam Dumps
(𝐓𝐋𝐄 𝟏𝟎𝟎) (𝐋𝐞𝐬𝐬𝐨𝐧 3)-𝐏𝐫𝐞𝐥𝐢𝐦𝐬
Lesson Outcomes:
- students will be able to identify and name various types of ornamental plants commonly used in landscaping and decoration, classifying them based on their characteristics such as foliage, flowering, and growth habits. They will understand the ecological, aesthetic, and economic benefits of ornamental plants, including their roles in improving air quality, providing habitats for wildlife, and enhancing the visual appeal of environments. Additionally, students will demonstrate knowledge of the basic requirements for growing ornamental plants, ensuring they can effectively cultivate and maintain these plants in various settings.
Creativity for Innovation and SpeechmakingMattVassar1
Tapping into the creative side of your brain to come up with truly innovative approaches. These strategies are based on original research from Stanford University lecturer Matt Vassar, where he discusses how you can use them to come up with truly innovative solutions, regardless of whether you're using to come up with a creative and memorable angle for a business pitch--or if you're coming up with business or technical innovations.
Information and Communication Technology in EducationMJDuyan
(𝐓𝐋𝐄 𝟏𝟎𝟎) (𝐋𝐞𝐬𝐬𝐨𝐧 2)-𝐏𝐫𝐞𝐥𝐢𝐦𝐬
𝐄𝐱𝐩𝐥𝐚𝐢𝐧 𝐭𝐡𝐞 𝐈𝐂𝐓 𝐢𝐧 𝐞𝐝𝐮𝐜𝐚𝐭𝐢𝐨𝐧:
Students will be able to explain the role and impact of Information and Communication Technology (ICT) in education. They will understand how ICT tools, such as computers, the internet, and educational software, enhance learning and teaching processes. By exploring various ICT applications, students will recognize how these technologies facilitate access to information, improve communication, support collaboration, and enable personalized learning experiences.
𝐃𝐢𝐬𝐜𝐮𝐬𝐬 𝐭𝐡𝐞 𝐫𝐞𝐥𝐢𝐚𝐛𝐥𝐞 𝐬𝐨𝐮𝐫𝐜𝐞𝐬 𝐨𝐧 𝐭𝐡𝐞 𝐢𝐧𝐭𝐞𝐫𝐧𝐞𝐭:
-Students will be able to discuss what constitutes reliable sources on the internet. They will learn to identify key characteristics of trustworthy information, such as credibility, accuracy, and authority. By examining different types of online sources, students will develop skills to evaluate the reliability of websites and content, ensuring they can distinguish between reputable information and misinformation.
How to Create a Stage or a Pipeline in Odoo 17 CRMCeline George
Using CRM module, we can manage and keep track of all new leads and opportunities in one location. It helps to manage your sales pipeline with customizable stages. In this slide let’s discuss how to create a stage or pipeline inside the CRM module in odoo 17.
How to Create a Stage or a Pipeline in Odoo 17 CRM
Configuring dynamic and static routing
1. C H A P T E R 11
Configuring Dynamic And Static Routing
To configure static routes and dynamic routing protocols, go to Configuration > Device Setup >
Routing area of the ASDM interface.
You can configure up to two OSPF, one EIGRP, and one RIP routing process on the security appliance
at the same time. Dynamic routing is only available on security appliances in routed firewall mode; you
cannot configure dynamic routing protocols on a security appliance in transparent firewall mode.
You can configure static routes on security appliances in either routed or transparent firewall mode. You
can use the static route tracking feature to have the security appliance a backup static route if a primary
static route becomes unavailable.
This section contains the following topics:
• Dynamic Routing, page 11-1
• Static Routes, page 11-40
• ASR Group, page 11-45
• Proxy ARPs, page 11-46
Dynamic Routing
This section contains the following topics:
• OSPF, page 11-1
• RIP, page 11-22
• EIGRP, page 11-28
OSPF
OSPF is an interior gateway routing protocol that uses link states rather than distance vectors for path
selection. OSPF propagates link-state advertisements rather than routing table updates. Because only
LSAs are exchanged instead of the entire routing tables, OSPF networks converge more quickly than RIP
networks.
OSPF supports MD5 and clear text neighbor authentication. Authentication should be used with all
routing protocols when possible because route redistribution between OSPF and other protocols (like
RIP) can potentially be used by attackers to subvert routing information.
Cisco ASDM User Guide
OL-16647-01 11-1
2. Chapter 11 Configuring Dynamic And Static Routing
Dynamic Routing
If NAT is used, if OSPF is operating on public and private areas, and if address filtering is required, then
you need to run two OSPF processes—one process for the public areas and one for the private areas.
A router that has interfaces in multiple areas is called an Area Border Router (ABR). A router that acts
as a gateway to redistribute traffic between routers using OSPF and routers using other routing protocols
is called an Autonomous System Boundary Router (ASBR).
An ABR uses LSAs to send information about available routes to other OSPF routers. Using ABR type
3 LSA filtering, you can have separate private and public areas with the security appliance acting as an
ABR. Type 3 LSAs (inter-area routes) can be filtered from one area to other. This lets you use NAT and
OSPF together without advertising private networks.
Note Only type 3 LSAs can be filtered. If you configure the security appliance as an ASBR in a private
network, it will send type 5 LSAs describing private networks, which will get flooded to the entire AS
including public areas.
If NAT is employed but OSPF is only running in public areas, then routes to public networks can be
redistributed inside the private network, either as default or type 5 AS External LSAs. However, you
need to configure static routes for the private networks protected by the security appliance. Also, you
should not mix public and private networks on the same security appliance interface.
You can have two OSPF routing processes, one RIP routing process, and one EIGRP routing process
running on the security appliance at the same time.
For more information about enabling and configuring OSPF, see the following:
• Setup, page 11-2
• Filtering, page 11-8
• Interface, page 11-10
• Redistribution, page 11-14
• Static Neighbor, page 11-17
• Summary Address, page 11-18
• Virtual Link, page 11-19
Setup
The Setup pane lets you enable OSPF processes, configure OSPF areas and networks, and define OSPF
route summarization.
For more information about configuring these areas, see the following:
• Setup > Process Instances Tab, page 11-3
• Setup > Area/Networks Tab, page 11-5
• Setup > Route Summarization Tab, page 11-7
Modes
The following table shows the modes in which this feature is available:
Cisco ASDM User Guide
11-2 OL-16647-01
3. Chapter 11 Configuring Dynamic And Static Routing
Dynamic Routing
Firewall Mode Security Context
Multiple
Routed Transparent Single Context System
• — • — —
Setup > Process Instances Tab
You can enable up to two OSPF process instances. Each OSPF process has its own associated areas and
networks.
Fields
• OSPF Process 1 and 2 areas—Each area contains the settings for a specific OSPF process.
• Enable this OSPF Process—Check the check box to enable an OSPF process. Uncheck this check
box to remove the OSPF process.
• OSPF Process ID—Enter a unique numeric identifier for the OSPF process. This process ID is used
internal and does not need to match the OSPF process ID on any other OSPF devices. Valid values
are from 1 to 65535.
• Advanced—Opens the Edit OSPF Process Advanced Properties dialog box, where you can
configure the Router ID, Adjacency Changes, Administrative Route Distances, Timers, and Default
Information Originate settings. See Edit OSPF Process Advanced Properties, page 11-3 for more
information.
Modes
The following table shows the modes in which this feature is available:
Firewall Mode Security Context
Multiple
Routed Transparent Single Context System
• — • — —
Edit OSPF Process Advanced Properties
You can edit process-specific settings, such as the Router ID, Adjacency Changes, Administrative Route
Distances, Timers, and Default Information Originate settings, in the Edit OSPF Process Advanced
Properties dialog box.
Fields
• OSPF Process—Displays the OSPF process you are configuring. You cannot change this value.
• Router ID—To used a fixed router ID, enter a router ID in IP address format in the Router ID field.
If you leave this value blank, the highest-level IP address on the security appliance is used as the
router ID.
• Ignore LSA MOSPF—Check this check box to suppress the sending of system log messages when
the security appliance receives type 6 (MOSPF) LSA packets. This setting is unchecked by default.
Cisco ASDM User Guide
OL-16647-01 11-3
4. Chapter 11 Configuring Dynamic And Static Routing
Dynamic Routing
• RFC 1583 Compatible—Check this check box to calculate summary route costs per RFC 1583.
Uncheck this check box to calculate summary route costs per RFC 2328. To minimize the chance of
routing loops, all OSPF devices in an OSPF routing domain should have RFC compatibility set
identically.This setting is selected by default.
• Adjacency Changes—Contains settings that define the adjacency changes that cause system log
messages to be sent.
– Log Adjacency Changes—Check this check box to cause the security appliance to send a system
log message whenever an OSPF neighbor goes up or down. This setting is selected by default.
– Log Adjacency Changes Detail—Check this check box to cause the security appliance to send
a system log message whenever any state change occurs, not just when a neighbor goes up or
down. This setting is unchecked by default.
• Administrative Route Distances—Contains the settings for the administrative distances of routes
based on the route type.
– Inter Area—Sets the administrative distance for all routes from one area to another. Valid values
range from 1 to 255. The default value is 100.
– Intra Area—Sets the administrative distance for all routes within an area. Valid values range
from 1 to 255. The default value is 100.
– External—Sets the administrative distance for all routes from other routing domains that are
learned through redistribution. Valid values range from 1 to 255. The default value is 100.
• Timers—Contains the settings used to configure LSA pacing and SPF calculation timers.
– SPF Delay Time—Specifies the time between when OSPF receives a topology change and when
the SPF calculation starts. Valid values range from 0 to 65535. The default value is 5.
– SPF Hold Time—Specifies the hold time between consecutive SPF calculations.Valid values
range from 1 to 65534. The default value is 10.
– LSA Group Pacing—Specifies the interval at which LSAs are collected into a group and
refreshed, checksummed, or aged. Valid values range from 10 to 1800. The default value is 240.
• Default Information Originate—Contains the settings used by an ASBR to generate a default
external route into an OSPF routing domain.
– Enable Default Information Originate—Check this check box to enable the generation of the
default route into the OSPF routing domain.
– Always advertise the default route—Check this check box to always advertise the default route.
This option is unchecked by default.
– Metric Value—Specifies the OSPF default metric. Valid values range from 0 to 16777214. The
default value is 1.
– Metric Type—Specifies the external link type associated with the default route advertised into
the OSPF routing domain. Valid values are 1 or 2, indicating a Type 1 or a Type 2 external route.
The default value is 2.
– Route Map—(Optional) The name of the route map to apply. The routing process generates the
default route if the route map is satisfied.
Modes
The following table shows the modes in which this feature is available:
Cisco ASDM User Guide
11-4 OL-16647-01
5. Chapter 11 Configuring Dynamic And Static Routing
Dynamic Routing
Firewall Mode Security Context
Multiple
Routed Transparent Single Context System
• — • — —
Setup > Area/Networks Tab
The Area/Networks tab displays the areas, and the networks they contain, for each OSPF process on the
security appliance.
Fields
• Area/Networks—Displays information about the areas and the area networks configured for each
OSPF process. Double-clicking a row in the table opens the Add/Edit OSPF Area dialog box for the
selected area.
– OSPF Process—Displays the OSPF process the area applies to.
– Area ID—Displays the area ID.
– Area Type—Displays the area type. The area type is one of the following values: Normal, Stub,
NSSA.
– Networks—Displays the area networks.
– Authentication—Displays the type of authentication set for the area. The authentication type is
one of the following values: None, Password, MD5.
– Options—Displays any options set for the area type.
– Cost—Displays the default cost for the area.
• Add—Opens the Add/Edit OSPF Area dialog box. Use this button to add a new area configuration.
• Edit—Opens the Add/Edit OSPF Area dialog box. Use this button to change the parameters of the
selected area.
• Delete—Removes the selected area from the configuration.
Modes
The following table shows the modes in which this feature is available:
Firewall Mode Security Context
Multiple
Routed Transparent Single Context System
• — • — —
Add/Edit OSPF Area
You define area parameters, the networks contained by the area, and the OSPF process associated with
the area in the Add/Edit OSPF Area dialog box.
Cisco ASDM User Guide
OL-16647-01 11-5
6. Chapter 11 Configuring Dynamic And Static Routing
Dynamic Routing
Fields
• OSPF Process—When adding a new area, choose the OSPF process ID for the OSPF process for
which the area is being. If there is only one OSPF process enabled on the security appliance, then
that process is selected by default. When editing an existing area, you cannot change the OSPF
process ID.
• Area ID—When adding a new area, enter the area ID. You can specify the area ID as either a decimal
number or an IP address. Valid decimal values range from 0 to 4294967295. You cannot change the
area ID when editing an existing area.
• Area Type—Contains the settings for the type of area being configured.
– Normal—Choose this option to make the area a standard OSPF area. This option is selected by
default when you first create an area.
– Stub—Choosing this option makes the area a stub area. Stub areas do not have any routers or
areas beyond it. Stub areas prevent AS External LSAs (type 5 LSAs) from being flooded into
the stub area. When you create a stub area, you have the option of preventing summary LSAs
(type 3 and 4) from being flooded into the area by unchecking the Summary check box.
– Summary—When the area being defined is a stub area, unchecking this check box prevents
LSAs from being sent into the stub area. This check box is selected by default for stub areas.
– NSSA—Choose this option to make the area a not-so-stubby area. NSSAs accept type 7 LSAs.
When you create a NSSA, you have the option of preventing summary LSAs from being flooded
into the area by unchecking the Summary check box. You can also disable route redistribution
by unchecking the Redistribute check box and enabling Default Information Originate.
– Redistribute—Uncheck this check box to prevent routes from being imported into the NSSA.
This check box is selected by default.
– Summary—When the area being defined is a NSSA, unchecking this check box prevents LSAs
from being sent into the stub area. This check box is selected by default for NSSAs.
– Default Information Originate—Check this check box to generate a type 7 default into the
NSSA. This check box is unchecked by default.
– Metric Value—Specifies the OSPF metric value for the default route. Valid values range from
0 to 16777214. The default value is 1.
– Metric Type—The OSPF metric type for the default route. The choices are 1 (type 1) or 2 (type
2). The default value is 2.
• Area Networks—Contains the settings for defining an OSPF area.
– Enter IP Address and Mask—Contains the settings used to define the networks in the area.
IP Address—Enter the IP address of the network or host to be added to the area. Use 0.0.0.0
with a netmask of 0.0.0.0 to create the default area. You can only use 0.0.0.0 in one area.
Netmask—Choose the network mask for the IP address or host to be added to the area. If adding
a host, choose the 255.255.255.255 mask.
– Add—Adds the network defined in the Enter IP Address and Mask area to the area. The added
network appears in the Area Networks table.
– Delete—Deletes the selected network from the Area Networks table.
– Area Networks—Displays the networks defined for the area.
IP Address—Displays the IP address of the network.
Netmask—Displays the network mask for the network.
• Authentication—Contains the settings for OSPF area authentication.
Cisco ASDM User Guide
11-6 OL-16647-01
7. Chapter 11 Configuring Dynamic And Static Routing
Dynamic Routing
– None—Choose this option to disable OSPF area authentication. This is the default setting.
– Password—Choose this option to use a clear text password for area authentication. This option
is not recommended where security is a concern.
– MD5—Choose this option to use MD5 authentication.
• Default Cost—Specify a default cost for the area. Valid values range from 0 to 65535. The default
value is 1.
Modes
The following table shows the modes in which this feature is available:
Firewall Mode Security Context
Multiple
Routed Transparent Single Context System
• — • — —
Setup > Route Summarization Tab
In OSPF, an ABR will advertise networks in one area into another area. If the network numbers in an
area are assigned in a way such that they are contiguous, you can configure the ABR to advertise a
summary route that covers all the individual networks within the area that fall into the specified range.
To define summary address for external routes being redistributed into an OSPF area, see Summary
Address.
Fields
• Route Summarization—Displays information about route summaries defined on the security
appliance. Double-clicking a row in the table opens the Add/Edit Route Summarization dialog box
for the selected route summary.
– OSPF Process—Displays the OSPF process ID for the OSPF process associated with the route
summary.
– Area ID—Displays the area associated with the route summary.
– IP Address—Displays the summary address.
– Network Mask—Displays the summary mask.
– Advertise—Displays “yes” when the route summaries are advertised when they match the
address/mask pair or “no” when route summaries are suppressed when they match the
address/mask pair.
• Add—Opens the Add/Edit Route Summarization dialog box. Use this button to define a new route
summarization.
• Edit—Opens the Add/Edit Route Summarization dialog box. Use this button to change the
parameters of the selected route summarization.
• Delete—Removes the selected route summarization from the configuration.
Modes
The following table shows the modes in which this feature is available:
Cisco ASDM User Guide
OL-16647-01 11-7
8. Chapter 11 Configuring Dynamic And Static Routing
Dynamic Routing
Firewall Mode Security Context
Multiple
Routed Transparent Single Context System
• — • — —
Add/Edit Route Summarization
Use the Add Route Summarization dialog box to add a new entry to the Route Summarization table. Use
the Edit Route Summarization dialog box to change an existing entry.
Fields
• OSPF Process—Choose the OSPF process the route summary applies to. You cannot change this
value when editing an existing route summary entry.
• Area ID—Choose the area ID the route summary applies to. You cannot change this value when
editing an existing route summary entry.
• IP Address—Enter the network address for the routes being summarized.
• Network Mask—Choose one of the common network masks from the list or type the mask in the
field.
• Advertise—Check this check box to set the address range status to “advertise”. This causes type 3
summary LSAs to be generated. Uncheck this check box to suppress the type 3 summary LSA for
the specified networks. This check box is checked by default.
Modes
The following table shows the modes in which this feature is available:
Firewall Mode Security Context
Multiple
Routed Transparent Single Context System
• — • — —
Filtering
The Filtering pane displays the ABR type 3 LSA filters that have been configured for each OSPF process.
ABR type 3 LSA filters allow only specified prefixes to be sent from one area to another area and
restricts all other prefixes. This type of area filtering can be applied out of a specific OSPF area, into a
specific OSPF area, or into and out of the same OSPF areas at the same time.
Benefits
OSPF ABR type 3 LSA filtering improves your control of route distribution between OSPF areas.
Restrictions
Only type 3 LSAs that originate from an ABR are filtered.
Cisco ASDM User Guide
11-8 OL-16647-01
9. Chapter 11 Configuring Dynamic And Static Routing
Dynamic Routing
Fields
The Filtering table displays the following information. Double-clicking a table entry opens the Add/Edit
Filtering Entry dialog box for the selected entry.
• OSPF Process—Displays the OSPF process associated with the filter entry.
• Area ID—Displays the ID of the area associated with the filter entry.
• Filtered Network—Displays the network address being filtered.
• Traffic Direction—Displays “Inbound” if the filter entry applies to LSAs coming in to an OSPF area
or Outbound if it applies to LSAs coming out of an OSPF area.
• Sequence #—Displays the sequence number for the filter entry. When multiple filters apply to an
LSA, the filter with the lowest sequence number is used.
• Action—Displays “Permit” if LSAs matching the filter are allowed or “Deny” if LSAs matching the
filter are denied.
• Lower Range—Displays the minimum prefix length to be matched.
• Upper Range—Displays the maximum prefix length to be matched.
You can perform the following actions on entries in the Filtering table:
• Add—Opens the Add/Edit Filtering Entry dialog box for adding a new entry to the Filter table.
• Edit—Opens the Add/Edit Filtering Entry dialog box for modifying the selected filter.
• Delete—Removes the selected filter from the Filter table.
Modes
The following table shows the modes in which this feature is available:
Firewall Mode Security Context
Multiple
Routed Transparent Single Context System
• — • — —
Add/Edit Filtering Entry
The Add/Edit Filtering Entry dialog box lets you add new filters to the Filter table or to modify an
existing filter. Some of the filter information cannot be changed when you edit an existing filter.
Fields
• OSPF Process—Choose the OSPF process associated with the filter entry. If you are editing an
existing filter entry, you cannot modify this setting.
• Area ID—Choose the ID of the area associated with the filter entry. If you are editing an existing
filter entry, you cannot modify this setting.
• Filtered Network—Enter the address and mask of the network being filtered using CIDR notation
(a.b.c.d/m).
• Traffic Direction—Choose the traffic direction being filtered. Choose “Inbound” to filter LSAs
coming into an OSPF area or “Outbound” to filter LSAs coming out of an OSPF area. If you are
editing an existing filter entry, you cannot modify this setting.
Cisco ASDM User Guide
OL-16647-01 11-9
10. Chapter 11 Configuring Dynamic And Static Routing
Dynamic Routing
• Sequence #—Enter a sequence number for the filter. Valid values range from 1 to 4294967294.
When multiple filters apply to an LSA, the filter with the lowest sequence number is used.
• Action—Choose “Permit” to allow the LSA traffic or “Deny” to block the LSA traffic.
• Optional—Contains the optional settings for the filter.
– Lower Range—Specify the minimum prefix length to be matched. The value of this setting must
be greater than the length of the network mask entered in the Filtered Network field and less
than or equal to the value, if present, entered in the Upper Range field.
– Upper Range—Enter the maximum prefix length to be matched. The value of this setting must
be greater than or equal to the value, if present, entered in the Lower Range field, or, if the
Lower Range field is left blank, greater than the length of the network mask length entered in
the Filtered Network field.
Modes
The following table shows the modes in which this feature is available:
Firewall Mode Security Context
Multiple
Routed Transparent Single Context System
• — • — —
Interface
The Interface pane lets you configure interface-specific OSPF routing properties, such as OSPF message
authentication and properties. For more information about configuring these properties, see the
following:
• Interface > Authentication Tab
• Interface > Properties Tab
Modes
The following table shows the modes in which this feature is available:
Firewall Mode Security Context
Multiple
Routed Transparent Single Context System
• — • — —
Interface > Authentication Tab
The Authentication tab displays the OSPF authentication information for the security appliance
interfaces.
Fields
• Authentication Properties—Displays the authentication information for the security appliance
interfaces. Double-clicking a row in the table opens the Edit OSPF Interface Properties dialog box
for the selected interface.
Cisco ASDM User Guide
11-10 OL-16647-01
11. Chapter 11 Configuring Dynamic And Static Routing
Dynamic Routing
– Interface—Displays the interface name.
– Authentication Type—Displays the type of OSPF authentication enabled on the interface. The
authentication type can be one of the following values:
None—OSPF authentication is disabled.
Password—Clear text password authentication is enabled.
MD5—MD5 authentication is enabled.
Area—The authentication type specified for the area is enabled on the interface. Area
authentication is the default value for interfaces. However, area authentication is disabled by
default. So, unless you previously specified an area authentication type, interfaces showing
Area authentication have authentication disabled.
• Edit—Opens the Edit OSPF Interface Properties dialog box for the selected interface.
Modes
The following table shows the modes in which this feature is available:
Firewall Mode Security Context
Multiple
Routed Transparent Single Context System
• — • — —
Edit OSPF Interface Authentication
The Edit OSPF Interface Authentication dialog box lets you configure the OSPF authentication type and
parameters for the selected interface.
Fields
• Interface—Displays the name of the interface for which authentication is being configured. You
cannot edit this field.
• Authentication—Contains the OSPF authentication options.
– None—Choose this option to disable OSPF authentication.
– Password—Choose this option to use clear text password authentication. This is not
recommended where security is a concern.
– MD5—Choose this option to use MD5 authentication (recommended).
– Area—(Default) Choose this option to use the authentication type specified for the area (see
Add/Edit OSPF Area for information about configuring area authentication). Area
authentication is disabled by default. So, unless you have previously specified an area
authentication type, interfaces set to area authentication have authentication disabled until you
configure area authentication.
• Authentication Password—Contains the settings for entering the password when password
authentication is enabled.
– Enter Password—Enter a text string of up to 8 characters.
– Re-enter Password—Reenter the password.
Cisco ASDM User Guide
OL-16647-01 11-11
12. Chapter 11 Configuring Dynamic And Static Routing
Dynamic Routing
• MD5 IDs and Keys—Contains the settings for entering the MD5 keys and parameters when MD5
authentication is enabled. All devices on the interface using OSPF authentication must use the same
MD5 key and ID.
– Enter MD5 ID and Key—Contains the settings for entering MD5 key information.
Key ID—Enter a numerical key identifier. Valid values range from 1 to 255.
Key—An alphanumeric character string of up to 16 bytes.
– Add—Adds the specified MD5 key to the MD5 ID and Key table.
– Delete—Removes the selected MD5 key and ID from the MD5 ID and Key table.
– MD5 ID and Key—Displays the configured MD5 keys and key IDs.
Key ID—Displays the key ID for the selected key.
Key—Displays the key for the selected key ID.
Modes
The following table shows the modes in which this feature is available:
Firewall Mode Security Context
Multiple
Routed Transparent Single Context System
• — • — —
Interface > Properties Tab
The Properties tab displays the OSPF properties defined for each interface in a table format.
Fields
• OSPF Interface Properties—Displays interface-specific OSPF properties. Double-clicking a row in
the table opens the Edit OSPF Interface Properties dialog box for the selected interface.
– Interface—Displays the name of the interface that the OSPF configuration applies to.
– Broadcast—Displays “No” if the interface is set to non-broadcast (point-to-point). Displays
“Yes” if the interface is set to broadcast. “Yes” is the default setting for Ethernet interfaces.
– Cost—Displays the cost of sending a packet through the interface.
– Priority—Displays the OSPF priority assigned to the interface.
– MTU Ignore—Displays “No” if MTU mismatch detection is enabled. Displays “Yes” if the
MTU mismatch detection is disabled.
– Database Filter—Displays “Yes” if outgoing LSAs are filtered during synchronization and
flooding. Displays “No” if filtering is not enabled.
• Edit—Opens the Edit OSPF Interface Properties dialog box for the selected interface.
Modes
The following table shows the modes in which this feature is available:
Cisco ASDM User Guide
11-12 OL-16647-01
13. Chapter 11 Configuring Dynamic And Static Routing
Dynamic Routing
Firewall Mode Security Context
Multiple
Routed Transparent Single Context System
• — • — —
Edit OSPF Interface Properties
Fields
• Interface—Displays the name of the interface for which you are configuring OSPF properties. You
cannot edit this field.
• Broadcast—Check this check box to specify that the interface is a broadcast interface. This check
box is selected by default for Ethernet interfaces. Uncheck this check box to designate the interface
as a point-to-point, non-broadcast interface. Specifying an interface as point-to-point, non-broadcast
lets you transmit OSPF routes over VPN tunnels.
When an interface is configured as point-to-point, non-broadcast, the following restrictions apply:
– You can define only one neighbor for the interface.
– You need to manually configure the neighbor (see Static Neighbor).
– You need to define a static route pointing to the crypto endpoint (see Static Routes).
– If OSPF over the tunnel is running on the interface, regular OSPF with an upstream router
cannot be run on the same interface.
– You should bind the crypto-map to the interface before specifying the OSPF neighbor to ensure
that the OSPF updates are passed through the VPN tunnel. If you bind the crypto-map to the
interface after specifying the OSPF neighbor, use the clear local-host all command to clear
OSPF connections so the OSPF adjacencies can be established over the VPN tunnel.
• Cost—Specify the cost of sending a packet through the interface. The default value is 10.
• Priority—Specify the OSPF router priority. When two routers connect to a network, both attempt to
become the designated router. The devices with the higher router priority becomes the designated
router. If there is a tie, the router with the higher router ID becomes the designated router.
Valid values for this setting range from 0 to 255.The default value is 1. Entering 0 for this setting
makes the router ineligible to become the designated router or backup designated router. This setting
does not apply to interfaces that are configured as point-to-point non-broadcast interfaces.
• MTU Ignore—OSPF checks whether neighbors are using the same MTU on a common interface.
This check is performed when neighbors exchange DBD packets. If the receiving MTU in the DBD
packet is higher than the IP MTU configured on the incoming interface, OSPF adjacency will not be
established.
• Database Filter—Check this check box to filter outgoing LSA interface during synchronization and
flooding. By default, OSPF floods new LSAs over all interfaces in the same area, except the
interface on which the LSA arrives. In a fully meshed topology, this can waste bandwidth and lead
to excessive link and CPU usage. Checking this check box prevents flooding OSPF LSA on the
selected interface.
Modes
The following table shows the modes in which this feature is available:
Cisco ASDM User Guide
OL-16647-01 11-13
14. Chapter 11 Configuring Dynamic And Static Routing
Dynamic Routing
Firewall Mode Security Context
Multiple
Routed Transparent Single Context System
• — • — —
Edit OSPF Interface Advanced Properties
The Edit OSPF Interface Advanced Properties dialog box lets you change the values for the OSPF hello
interval, retransmit interval, transmit delay, and dead interval. Typically, you only need to change these
values from the defaults if you are experiencing OSPF problems on your network.
Fields
• Hello Interval—Specifies the interval, in seconds, between hello packets sent on an interface. The
smaller the hello interval, the faster topological changes are detected but the more traffic is sent on
the interface. This value must be the same for all routers and access servers on a specific interface.
Valid values range from 1 to 65535 seconds. The default value is 10 seconds.
• Retransmit Interval—Specifies the time, in seconds, between LSA retransmissions for adjacencies
belonging to the interface. When a router sends an LSA to its neighbor, it keeps the LSA until it
receives the acknowledgement message. If the router receives no acknowledgement, it will resend
the LSA. Be conservative when setting this value, or needless retransmission can result. The value
should be larger for serial lines and virtual links. Valid values range from 1 to 65535 seconds. The
default value is 5 seconds.
• Transmit Delay—Specifies the estimated time, in seconds, required to send an LSA packet on the
interface. LSAs in the update packet have their ages increased by the amount specified by this field
before transmission. If the delay is not added before transmission over a link, the time in which the
LSA propagates over the link is not considered. The value assigned should take into account the
transmission and propagation delays for the interface. This setting has more significance on very
low-speed links. Valid values range from 1 to 65535 seconds. The default value is 1 second.
• Dead Interval—Specifies the interval, in seconds, in which no hello packets are received, causing
neighbors to declare a router down. Valid values range from 1 to 65535. The default value of this
setting is four times the interval set by the Hello Interval field.
Modes
The following table shows the modes in which this feature is available:
Firewall Mode Security Context
Multiple
Routed Transparent Single Context System
• — • — —
Redistribution
The Redistribution pane displays the rules for redistributing routes from one routing process into an
OSPF routing process.
Cisco ASDM User Guide
11-14 OL-16647-01
15. Chapter 11 Configuring Dynamic And Static Routing
Dynamic Routing
Fields
The Redistribution table displays the following information. Double-clicking a table entry opens the
Add/Edit OSPF Redistribution Entry dialog box for the selected entry.
• OSPF Process—Displays the OSPF process associated with the route redistribution entry.
• Protocol—Displays the source protocol the routes are being redistributed from. Valid entries are the
following:
– Static—Static routes are redistributed into the OSPF routing process.
– Connected—The route was established automatically by virtue of having IP enabled on the
interface. These routes are redistributed into the OSPF routing process as external to the AS.
– OSPF—Routes from another OSPF routing process are being redistributed into the OSPF
routing process.
– EIGRP—Routes are redistributed from the EIGRP routing process into the OSPF routing
process.
– RIP—Routes are redistributed from the RIP routing process into the OSPF routing process.
• Match—Displays the conditions used for redistributing routes from one OSPF routing process to
another.
• Subnets—Displays “Yes” if subnetted routes are redistributed. Does not display anything if only
routes that are not subnetted are redistributed.
• Metric Value—Displays the metric that is used for the route. This column is blank for redistribution
entries if the default metric is used.
• Metric Type—Displays “1” if the metric is a Type 1 external route, “2” if the metric is Type 2
external route.
• Tag Value—A 32-bit decimal value attached to each external route. This value is not used by OSPF
itself. It may be used to communicate information between ASBRs. Valid values range from 0 to
4294967295.
• Route Map—Displays the name of the route map to apply to the redistribution entry.
You can perform the following actions on the Redistribution table entries:
• Add—Opens the Add/Edit OSPF Redistribution Entry dialog box for adding a new redistribution
entry.
• Edit—Opens the Add/Edit OSPF Redistribution Entry dialog box for modifying the selected
redistribution entry.
• Delete—Removes the selected redistribution entry from the Redistribution table.
Modes
The following table shows the modes in which this feature is available:
Firewall Mode Security Context
Multiple
Routed Transparent Single Context System
• — • — —
Cisco ASDM User Guide
OL-16647-01 11-15
16. Chapter 11 Configuring Dynamic And Static Routing
Dynamic Routing
Add/Edit OSPF Redistribution Entry
The Add/Edit OSPF Redistribution Entry dialog box lets you add a new redistribution rule to or edit an
existing redistribution rule in the Redistribution table. Some of the redistribution rule information cannot
be changed when you are editing an existing redistribution rule.
Fields
• OSPF Process—Choose the OSPF process associated with the route redistribution entry. If you are
editing an existing redistribution rule, you cannot change this setting.
• Protocol—Choose the source protocol the routes are being redistributed from. You can choose one
of the following options:
– Static—Redistribute static routes into the OSPF routing process.
– Connected—Redistribute connected routes (routes established automatically by virtue of
having IP enabled on the interface) into the OSPF routing process. Connected routes are
redistributed as external to the AS.
– OSPF—Redistribute routes from another OSPF routing process. Choose the OSPF process ID
from the list.
– RIP—Redistribute routes from the RIP routing process.
– EIGRP—Redistribute routes from the EIGRP routing process. Choose the autonomous system
number of the EIGRP routing process from the list.
• Match—Displays the conditions used for redistributing routes from another OSPF routing process
into the selected OSPF routing process. These options are not available when redistributing static,
connected, RIP, or EIGRP routes. The routes must match the selected condition to be redistributed.
You can choose one or more of the following match conditions:
– Internal—The route is internal to a specific AS.
– External 1—Routes that are external to the autonomous system, but are imported into OSPF as
Type 1 external routes.
– External 2—Routes that are external to the autonomous system, but are imported into OSPF as
Type 2 external routes.
– NSSA External 1—Routes that are external to the autonomous system, but are imported into
OSPF as Type 2 NSSA routes.
– NSSA External 2—Routes that are external to the autonomous system, but are imported into
OSPF as Type 2 NSSA routes.
• Metric Value—Specify the metric value for the routes being redistributed. Valid values range from
1 to 16777214. When redistributing from one OSPF process to another OSPF process on the same
device, the metric will be carried through from one process to the other if no metric value is
specified. When redistributing other processes to an OSPF process, the default metric is 20 when no
metric value is specified.
• Metric Type—Choose “1” if the metric is a Type 1 external route, “2” if the metric is a Type 2
external route.
• Tag Value—The tag value is a 32-bit decimal value attached to each external route. This is not used
by OSPF itself. It may be used to communicate information between ASBRs. Valid values range
from 0 to 4294967295.
• Use Subnets—Check this check box to enable the redistribution of subnetted routes. Uncheck this
check box to cause only routes that are not subnetted to be redistributed.
• Route Map—Enter the name of the route map to apply to the redistribution entry.
Cisco ASDM User Guide
11-16 OL-16647-01
17. Chapter 11 Configuring Dynamic And Static Routing
Dynamic Routing
Modes
The following table shows the modes in which this feature is available:
Firewall Mode Security Context
Multiple
Routed Transparent Single Context System
• — • — —
Static Neighbor
The Static Neighbor pane displays manually defined neighbors; it does not display discovered neighbors.
You need to define a static neighbor for each point-to-point, non-broadcast interface. You also need to
define a static route for each static neighbor in the Static Neighbor table.
Fields
• Static Neighbor—Displays information for the static neighbors defined for each OSPF process.
Double-clicking a row in the table opens the Add/Edit OSPF Neighbor Entry dialog box.
– OSPF Process—Displays the OSPF process associated with the static neighbor.
– Neighbor—Displays the IP address of the static neighbor.
– Interface—Displays the interface associated with the static neighbor.
• Add—Opens the Add/Edit OSPF Neighbor Entry dialog box. Use this button to define a new static
neighbor.
• Edit—Opens the Add/Edit OSPF Neighbor Entry dialog box. Use this button to change the settings
for a static neighbor.
• Delete—Removes the selected entry from the Static Neighbor table.
Modes
The following table shows the modes in which this feature is available:
Firewall Mode Security Context
Multiple
Routed Transparent Single Context System
• — • — —
Add/Edit OSPF Neighbor Entry
The Add/Edit OSPF Neighbor Entry dialog box lets you define a new static neighbor or change
information for an existing static neighbor.
You must define a static neighbor for each point-to-point, non-broadcast interface.
Restrictions
• You cannot define the same static neighbor for two different OSPF processes.
• You need to define a static route for each static neighbor (see Static Routes, page 11-42).
Cisco ASDM User Guide
OL-16647-01 11-17
18. Chapter 11 Configuring Dynamic And Static Routing
Dynamic Routing
Fields
• OSPF Process—Choose the OSPF process associated with the static neighbor. If you are editing an
existing static neighbor, you cannot change this value.
• Neighbor—Enter the IP address of the static neighbor.
• Interface—Choose the interface associated with the static neighbor. If you are editing an existing
static neighbor, you cannot change this value.
Modes
The following table shows the modes in which this feature is available:
Firewall Mode Security Context
Multiple
Routed Transparent Single Context System
• — • — —
Summary Address
The Summary Address pane displays information about the summary addresses configured for each
OSPF routing process.
Routes learned from other routing protocols can be summarized. The metric used to advertise the
summary is the smallest metric of all the more specific routes. Summary routes help reduce the size of
the routing table.
Using summary routes for OSPF causes an OSPF ASBR to advertise one external route as an aggregate
for all redistributed routes that are covered by the address. Only routes from other routing protocols that
are being redistributed into OSPF can be summarized.
Fields
The following information appears in the Summary Address table. Double-clicking an entry in the table
opens the Add/Edit OSPF Summary Address Entry dialog box for the selected entry.
• OSPF Process—Displays the OSPF process associated with the summary address.
• IP Address—Displays the IP address of the summary address.
• Netmask—Displays the network mask of the summary address.
• Advertise—Displays “Yes” if the summary routes are advertised. Displays “No” if the summary
route is not advertised.
• Tag—Displays a 32-bit decimal value attached to each external route. This value is not used by
OSPF itself. It may be used to communicate information between ASBRs.
You can perform the following actions on the entries in the Summary Address table:
• Add—Opens the Add/Edit OSPF Summary Address Entry dialog box for adding new summary
address entries.
• Edit—Opens the Add/Edit OSPF Summary Address Entry dialog box for editing the selected entry.
• Delete—Removes the selected summary address entry from the Summary Address table.
Modes
The following table shows the modes in which this feature is available:
Cisco ASDM User Guide
11-18 OL-16647-01
19. Chapter 11 Configuring Dynamic And Static Routing
Dynamic Routing
Firewall Mode Security Context
Multiple
Routed Transparent Single Context System
• — • — —
Add/Edit OSPF Summary Address Entry
The Add/Edit OSPF Summary Address Entry dialog box lets you add new entries to or modify existing
entries in the Summary Address table. Some of the summary address information cannot be changed
when editing an existing entry.
Fields
• OSPF Process—Choose the OSPF process associated with the summary address. You cannot change
this information when editing an existing entry.
• IP Address—Enter the IP address of the summary address. You cannot change this information when
editing an existing entry.
• Netmask—Enter the network mask for the summary address, or choose the network mask from the
list of common masks. You cannot change this information when editing an existing entry.
• Advertise—Check this check box to advertise the summary route. Uncheck this check box to
suppress routes that fall under the summary address. By default this check box is checked.
• Tag—(Optional) The tag value is a 32-bit decimal value attached to each external route. This is not
used by OSPF itself. It may be used to communicate information between ASBRs. Valid values
range from 0 to 4294967295.
Modes
The following table shows the modes in which this feature is available:
Firewall Mode Security Context
Multiple
Routed Transparent Single Context System
• — • — —
Virtual Link
If you add an area to an OSPF network, and it is not possible to connect the area directly to the backbone
area, you need to create a virtual link. A virtual link connects two OSPF devices that have a common
area, called the transit area. One of the OSPF devices must be connected to the backbone area.
Fields
The Virtual Link table displays the following information. Doubling-clicking an entry in the table opens
the Add/Edit Virtual Link dialog box for the selected entry.
• OSPF Process—Displays the OSPF process associated with the virtual link.
• Area ID—Displays the ID of the transit area.
• Peer Router ID—Displays the router ID of the virtual link neighbor.
Cisco ASDM User Guide
OL-16647-01 11-19
20. Chapter 11 Configuring Dynamic And Static Routing
Dynamic Routing
• Authentication—Displays the type of authentication used by the virtual link:
– None—No authentication is used.
– Password—Clear text password authentication is used.
– MD5—MD5 authentication is used.
You can perform the following actions on the entries in the Virtual Link table:
• Add—Opens the Add/Edit Virtual Link dialog box for adding a new entry to the Virtual Link table.
• Edit—Opens the Add/Edit Virtual Link dialog box for the selected entry.
• Delete—Removes the selected entry from the Virtual Link table.
Modes
The following table shows the modes in which this feature is available:
Firewall Mode Security Context
Multiple
Routed Transparent Single Context System
• — • — —
Add/Edit Virtual Link
The Add/Edit Virtual Link dialog box lets you define new virtual links or change the properties of
existing virtual links.
Fields
• OSPF Process—Choose the OSPF process associated with the virtual link. If you are editing an
existing virtual link, you cannot change this value.
• Area ID—Choose the area shared by the neighbor OSPF devices. The selected area cannot be an
NSSA or a Stub area. If you are editing an existing virtual link, you cannot change this value.
• Peer Router ID—Enter the router ID of the virtual link neighbor. If you are editing an existing virtual
link, you cannot change this value.
• Advanced—Opens the Advanced OSPF Virtual Link Properties dialog box. You can configure the
OSPF properties for the virtual link in this area. These properties include authentication and packet
interval settings.
Modes
The following table shows the modes in which this feature is available:
Firewall Mode Security Context
Multiple
Routed Transparent Single Context System
• — • — —
Cisco ASDM User Guide
11-20 OL-16647-01
21. Chapter 11 Configuring Dynamic And Static Routing
Dynamic Routing
Advanced OSPF Virtual Link Properties
The Advanced OSPF Virtual Link Properties dialog box lets you configure OSPF authentication and
packet intervals.
Fields
• Authentication—Contains the OSPF authentication options.
– None—Choose this option to disable OSPF authentication.
– Password—Choose this option to use clear text password authentication. This is not
recommended where security is a concern.
– MD5—Choose this option to use MD5 authentication (recommended).
• Authentication Password—Contains the settings for entering the password when password
authentication is enabled.
– Enter Password—Enter a text string of up to 8 characters.
– Re-enter Password—Reenter the password.
• MD5 IDs and Keys—Contains the settings for entering the MD5 keys and parameters when MD5
authentication is enabled. All devices on the interface using OSPF authentication must use the same
MD5 key and ID.
– Enter MD5 ID and Key—Contains the settings for entering MD5 key information.
Key ID—Enter a numerical key identifier. Valid values range from 1 to 255.
Key—An alphanumeric character string of up to 16 bytes.
– Add—Adds the specified MD5 key to the MD5 ID and Key table.
– Delete—Removes the selected MD5 key and ID from the MD5 ID and Key table.
– MD5 ID and Key—Displays the configured MD5 keys and key IDs.
Key ID—Displays the key ID for the selected key.
Key—Displays the key for the selected key ID.
• Intervals—Contains the settings for modifying packet interval timing.
– Hello Interval—Specifies the interval, in seconds, between hello packets sent on an interface.
The smaller the hello interval, the faster topological changes are detected but the more traffic is
sent on the interface. This value must be the same for all routers and access servers on a specific
interface. Valid values range from 1 to 65535 seconds. The default value is 10 seconds.
– Retransmit Interval—Specifies the time, in seconds, between LSA retransmissions for
adjacencies belonging to the interface. When a router sends an LSA to its neighbor, it keeps the
LSA until it receives the acknowledgement message. If the router receives no
acknowledgement, it will resend the LSA. Be conservative when setting this value, or needless
retransmission can result. The value should be larger for serial lines and virtual links. Valid
values range from 1 to 65535 seconds. The default value is 5 seconds.
– Transmit Delay—Specifies the estimated time, in seconds, required to send an LSA packet on
the interface. LSAs in the update packet have their ages increased by the amount specified by
this field before transmission. If the delay is not added before transmission over a link, the time
in which the LSA propagates over the link is not considered. The value assigned should take
into account the transmission and propagation delays for the interface. This setting has more
significance on very low-speed links. Valid values range from 1 to 65535 seconds. The default
value is 1 second.
Cisco ASDM User Guide
OL-16647-01 11-21
22. Chapter 11 Configuring Dynamic And Static Routing
Dynamic Routing
– Dead Interval—Specifies the interval, in seconds, in which no hello packets are received,
causing neighbors to declare a router down. Valid values range from 1 to 65535. The default
value of this field is four times the interval set by the Hello Interval field.
Modes
The following table shows the modes in which this feature is available:
Firewall Mode Security Context
Multiple
Routed Transparent Single Context System
• — • — —
RIP
RIP is a distance-vector routing protocol that uses hop count as the metric for path selection. When RIP
is enabled on an interface, the interface exchanges RIP broadcasts with neighboring devices to
dynamically learn about and advertise routes.
The security appliance support both RIP version 1 and RIP version 2. RIP version 1 does not send the
subnet mask with the routing update. RIP version 2 sends the subnet mask with the routing update and
supports variable-length subnet masks. Additionally, RIP version 2 supports neighbor authentication
when routing updates are exchanged. This authentication ensures that the security appliance receives
reliable routing information from a trusted source.
Limitations
RIP has the following limitations:
• The security appliance cannot pass RIP updates between interfaces.
• RIP Version 1 does not support variable-length subnet masks.
• RIP has a maximum hop count of 15. A route with a hop count greater than 15 is considered
unreachable.
• RIP convergence is relatively slow compared to other routing protocols.
• You can only enable a single RIP process on the security appliance.
RIP Version 2 Notes
The following information applies to RIP Version 2 only:
• If using neighbor authentication, the authentication key and key ID must be the same on all neighbor
devices that provide RIP version 2 updates to the interface.
• With RIP version 2, the security appliance transmits and receives default route updates using the
multicast address 224.0.0.9. In passive mode, it receives route updates at that address.
• When RIP version 2 is configured on an interface, the multicast address 224.0.0.9 is registered on
that interface. When a RIP version 2 configuration is removed from an interface, that multicast
address is unregistered.
Cisco ASDM User Guide
11-22 OL-16647-01
23. Chapter 11 Configuring Dynamic And Static Routing
Dynamic Routing
Setup
Use the Setup pane to enable RIP on the security appliance and to configure global RIP protocol
parameters. You can only enable a single RIP process on the security appliance.
Fields
• Enable RIP Routing—Check this check box to enable RIP routing on the security appliance. When
you enable RIP, it is enabled on all interfaces. Checking this check box also enables the other fields
on this pane. Uncheck this check box to disable RIP routing on the security appliance.
• Enable Auto-summarization—Clear this check box to disable automatic route summarization.
Check this check box to reenable automatic route summarization. RIP Version 1 always uses
automatic summarization. You cannot disable automatic summarization for RIP Version 1. If you
are using RIP Version 2, you can turn off automatic summarization by unchecking this check box.
Disable automatic summarization if you must perform routing between disconnected subnets. When
automatic summarization is disabled, subnets are advertised.
• Enable RIP version—Check this check box to specify the version of RIP used by the security
appliance. If this check box is cleared, then the security appliance sends RIP Version 1 updates and
accepts RIP Version 1 & Version 2 updates. This setting can be overridden on a per-interface basis
in the Interface pane.
– Version 1—Specifies that the security appliance only sends and receives RIP Version 1 updates.
Any version 2 updates received are dropped.
– Version 2—Specifies that the security appliance only sends and receives RIP Version 2 updates.
Any version 1 updates received are dropped.
• Enable default information originate—Check this check box to generate a default route into the RIP
routing process. You can configure a route map that must be satisfied before the default route can
be generated.
– Route-map—Enter the name of the route map to apply. The routing process generates the
default route if the route map is satisfied.
• IP Network to Add—Defines a network for the RIP routing process. The network number specified
must not contain any subnet information. There is no limit to the number of network you can add to
the security appliance configuration. RIP routing updates will be sent and received only through
interfaces on the specified networks. Also, if the network of an interface is not specified, the
interface will not be advertised in any RIP updates.
– Add—Click this button to add the specified network to the list of networks.
– Delete—Click this button to removed the selected network from the list of networks.
• Configure interfaces as passive globally—Check this check box to set all interfaces on the security
appliance to passive RIP mode. The security appliance listens for RIP routing broadcasts on all
interfaces and uses that information to populate the routing tables but do not broadcast routing
updates. To set specific interfaces to passive RIP, use the Passive Interfaces table.
• Passive Interfaces table—Lists the configured interfaces on the security appliance. Check the check
box in the Passive column for those interfaces you want to operate in passive mode. The other
interfaces will still send and receive RIP broadcasts.
Modes
The following table shows the modes in which this feature is available:
Cisco ASDM User Guide
OL-16647-01 11-23
24. Chapter 11 Configuring Dynamic And Static Routing
Dynamic Routing
Firewall Mode Security Context
Multiple
Routed Transparent Single Context System
• — • — —
Interface
The Interface pane allows you to configure interface-specific RIP settings, such as the version of RIP the
interface sends and receives and the authentication method, if any, used for the RIP broadcasts.
Fields
• Interface table—Each row displays the interface-specific RIP settings for an interface.
Double-clicking a row for that entry opens the Edit RIP Interface Entry dialog box for that interface.
• Edit—Opens the Edit RIP Interface Entry dialog box for the interface selected in the Interface table.
Modes
The following table shows the modes in which this feature is available:
Firewall Mode Security Context
Multiple
Routed Transparent Single Context System
• — • — —
Edit RIP Interface Entry
The Edit RIP Interface Entry dialog box allows you to configure the interface-specific RIP settings.
Fields
• Override Global Send Version—Check this check box to specify the RIP version sent by the
interface. You can select the following options:
– Version 1
– Version 2
– Version 1 & 2
Unchecking this check box restores the global setting.
• Override Global Receive Version—Check this check box to specify the RIP version accepted by the
interface. If a RIP updated from an unsupported version of RIP is received by the interface, it is
dropped. You can select the following options:
– Version 1
– Version 2
– Version 1 & 2
Unchecking this check box restores the global setting.
Cisco ASDM User Guide
11-24 OL-16647-01
25. Chapter 11 Configuring Dynamic And Static Routing
Dynamic Routing
• Enable Authentication—Check this check box to enable RIP authentication. Uncheck this check box
to disable RIP broadcast authentication.
– Key—The key used by the authentication method. Can contain up to 16 characters.
– Key ID—The key ID. Valid values are from 0 to 255.
– Authentication Mode—You can select the following authentication modes:
MD5—Uses MD5 for RIP message authentication.
Text—Uses cleartext for RIP message authentication (not recommended).
Modes
The following table shows the modes in which this feature is available:
Firewall Mode Security Context
Multiple
Routed Transparent Single Context System
• — • — —
Filter Rules
Filter rules allow you to filter the network received in RIP routing updates or sent in RIP routing updates.
Each filter rule consists of one or more network rules.
Fields
• Filter Rules table—Displays the configured RIP filter rules.
• Add—Clicking this button opens the Add/Edit Filter Rule dialog box. The new filter rule is added
to the bottom of the list.
• Edit—Clicking this button opens the Add/Edit Filter Rule dialog box for the selected filter rule.
• Delete—Clicking this button deletes the selected filter rule.
Modes
The following table shows the modes in which this feature is available:
Firewall Mode Security Context
Multiple
Routed Transparent Single Context System
• — • — —
Add/Edit Filter Rule
Use the Add/Edit Filter Rule pane to create filter rules. You can create filter rules that apply to all
interfaces or that apply to a specific interface.
Fields
• Direction—Select one of the following directions for the filter to act upon:
Cisco ASDM User Guide
OL-16647-01 11-25
26. Chapter 11 Configuring Dynamic And Static Routing
Dynamic Routing
– In—Filters networks on incoming RIP updates.
– Out—Filters networks from outgoing RIP updates.
• Interface—You can select a specific interface for the filter rule, or you can select the All Interfaces
option to apply the filter to all interfaces.
• Action—(Display only) Displays Permit if the specified network is not filtered from incoming or
outgoing RIP advertisements. Displays Deny if the specified network is to be filtered from incoming
or outgoing RIP advertisements.
• IP Address—(Display only) Displays the IP address of the network being filtered.
• Netmask—(Display only) Displays the network mask applied to the IP address.
• Insert—Click this button to add a network rule above the selected rule in the list. Clicking this button
opens the Network Rule dialog box.
• Edit—Click this button to edit the selected rule. Clicking this button opens the Network Rule dialog
box.
• Add—Click this button to add a network rule below the selected rule in the list. Clicking this button
opens the Network Rule dialog box.
Modes
The following table shows the modes in which this feature is available:
Firewall Mode Security Context
Multiple
Routed Transparent Single Context System
• — • — —
Network Rule
The Network Rule pane allows you to configure permit and deny rules for specific networks in a filter
rule.
Fields
• Action—Select Permit to allow the specified network to be advertised in RIP updates or accepted
into the RIP routing process. Select Deny to prevent the specified network from being advertised in
RIP updates or accepted into the RIP routing process.
• IP Address—Type IP address of the network being permitted or denied.
• Netmask—Specify the network mask applied to the network IP address. You can type a network
mask into this field or select one of the common masks from the list.
Modes
The following table shows the modes in which this feature is available:
Cisco ASDM User Guide
11-26 OL-16647-01