rip1

Classified in Language

Written on in English with a size of 2.51 KB

RIP2

What are the main extensions of RIPv2 compared to RIPv1? The extensions are: subnet masks carried with each route entry, authentication of routing updates, next-hop addresses carried with each route entry, external route tags, and multicast route updates.

What is the main advantage of multicasting the updates compared to broadcasting them? The main advantage of multicasting is that the devices on the local network that are not concerned with RIP routing do not have to spend time unwrapping broadcast packets from the router.

What is the benefit of Route Tag field? External routing protocols connected to a RIP domain in multiple location may use the Route Tag field to exchange information across the RIP domain.

Who to enable classless route lookup? We can enable classless route lookup even for classful routing protocols such as RIPv1 and IGRP by entering the global command ip classless.

How authentication is implemented in RIPv2? The first route entry of the RIP message is reserved for the authentication. Only 24 entries are now possible. This field implements an alphanumeric password of up to 16 characters. Cisco uses MD5 authentication instead of simple password.

How to capture RIPv2 password? The password is carried in plain text and can be read by anyone who can sniff (using Ethereal) the packet carrying the update.

What is RIPng protocol? It is RIPv2 for IPv6 networks.

What is the difference between RIPv2 and RIPng with respect to IP security? RIPng does not have an authentication mechanism of its own, but instead relies on the authentication features of IPv6.

How to make two routers running two different versions of RIP speaking to each other? The compatibility is set by the Cisco commands: ip rip send version, and, ip rip receive version.

How to activate MD5 authentication in RIPv2? The authentication includes the choice of simple password or MD5 authentication, and the option of defining multiple keys, or passwords on a “key chain”. Then it uses ip rip authentication mode md5.

How key management is used to migrate from one authentication key to another? The handover can be changed by both the accept-lifetime and the send-lifetime. A synchronization using NTP protocol is highly recommended.

Related entries: