Information Technology Reference
In-Depth Information
Example 7-10 shows the configuration of Router8 by using RIPv2. You use the version 2
command to enable RIPv2. Use plain text passwords for route authentication by using the key-
chain named ccie. The RIP authentication is configured on Ethernet 0 by using the ip rip
authentication command.
Example 7-10 Configuration of Router8
hostname router8
!
key chain ccie
key 1
key-string ccie
!
interface Ethernet0
ip address 172.16.1.2 255.255.255.0
ip rip authentication key-chain ccie
!
interface TokenRing0
ip address 172.16.3.1 255.255.255.240
ring-speed 16
!
router rip
version 2
network 172.16.0.0
!
Example 7-11 shows the output of the show ip route command on Router8. A mask
accompanies the learned networks 172.16.4.0/30 and 172.16.2.0/24.
30
24
Example 7-11 show ip route Command on Router8
router8#show ip route
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
* - candidate default, U - per-user static route, o - ODR
P - periodic downloaded static route
Gateway of last resort is not set
172.16.0.0/16 is variably subnetted, 4 subnets, 3 masks
R 172.16.4.0/30 [120/1] via 172.16.1.1, 00:00:12, Ethernet0
C 172.16.1.0/24 is directly connected, Ethernet0
R 172.16.2.0/24 [120/2] via 172.16.1.1, 00:00:12, Ethernet0
C 172.16.3.0/28 is directly connected, TokenRing0
Search WWH ::




Custom Search