Routing Archives - NIL - Network Information Library https://nil.uniza.sk/category/practical_-_cisco-en/routing-en-practical_-_cisco-en/ Knowledge portal - KIS FRI UNIZA Thu, 05 Dec 2019 14:38:25 +0000 en-US hourly 1 https://wordpress.org/?v=6.4.4 https://nil.uniza.sk/wp-content/uploads/2018/11/1.png Routing Archives - NIL - Network Information Library https://nil.uniza.sk/category/practical_-_cisco-en/routing-en-practical_-_cisco-en/ 32 32 Configuration of the RIPv2 authentication https://nil.uniza.sk/configuration-ripv2-authentication/ https://nil.uniza.sk/configuration-ripv2-authentication/#respond Wed, 02 Dec 2009 21:39:45 +0000 In this article I will configure, debug and shows the process of RIPv2 authentication.

 

Authentication methods

  1. Plain text
  2. MD5

 

Note 1: When using plain text authentication mode, make sure that the following parameters are matching on neighboring routers for successful authentication.

  • Key-string

  • Authentication mode

    The post Configuration of the RIPv2 authentication appeared first on NIL - Network Information Library.

    ]]> https://nil.uniza.sk/configuration-ripv2-authentication/feed/ 0 Possible bugs/limitations encountered in Cisco’s RIP implementation https://nil.uniza.sk/possible-bugslimitations-encountered-ciscos-rip-implementation/ https://nil.uniza.sk/possible-bugslimitations-encountered-ciscos-rip-implementation/#respond Sun, 25 Jan 2009 20:24:49 +0000
  • Default route origination not working reliably.
  • Automatic summarization turned on causes major networks to be propagated throughout the RIP domain with a metric of 1.
  • Using RIPv2 on NBMA hub-and-spoke topology causes the hub router to rewrite the next hop field in the RIPv2 update to the IP address of the spoke router advertising the originalupdate, thereby creating reachability issues
  • The post Possible bugs/limitations encountered in Cisco’s RIP implementation appeared first on NIL - Network Information Library.

    ]]> https://nil.uniza.sk/possible-bugslimitations-encountered-ciscos-rip-implementation/feed/ 0 Parsing OSPF packets using tcpdump https://nil.uniza.sk/parsing-ospf-packets-using-tcpdump/ https://nil.uniza.sk/parsing-ospf-packets-using-tcpdump/#respond Mon, 04 Feb 2013 11:01:02 +0000 Sometimes we need to capture and parse OSPF packets for next analysis and we have a comand line only, in my case on linux server with dynamips. We should use tcpdump tool for this purpose, of course, several ways are available.

    Capturing OSPF packets on the fly

    tcpdump -i eth0 ip[9] == 89
    

    where OSPF ip protocol number is 89, and the protocol field is the 9th octet on the ip header.

    Another way is:

    tcpdump -i eth0 proto ospf

    Writing captured packets to a file

    The post Parsing OSPF packets using tcpdump appeared first on NIL - Network Information Library.

    ]]>
    https://nil.uniza.sk/parsing-ospf-packets-using-tcpdump/feed/ 0