EasyManuals Logo

Cisco 5510 - ASA SSL / IPsec VPN Edition Configuration Guide

Cisco 5510 - ASA SSL / IPsec VPN Edition
1822 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #358 background imageLoading...
Page #358 background image
18-6
Cisco ASA 5500 Series Configuration Guide using ASDM
OL-20339-01
Chapter 18 Information About Routing
Information About the Routing Table
How the Routing Table Is Populated
The adaptive security appliance routing table can be populated by statically defined routes, directly
connected routes, and routes discovered by the RIP, EIGRP, and OSPF routing protocols. Because the
adaptive security appliance can run multiple routing protocols in addition to having static and connected
routes in the routing table, it is possible that the same route is discovered or entered in more than one
manner. When two routes to the same destination are put into the routing table, the one that remains in
the routing table is determined as follows:
If the two routes have different network prefix lengths (network masks), then both routes are
considered unique and are entered in to the routing table. The packet forwarding logic then
determines which of the two to use.
For example, if the RIP and OSPF processes discovered the following routes:
RIP: 192.168.32.0/24
OSPF: 192.168.32.0/19
Even though OSPF routes have the better administrative distance, both routes are installed in the
routing table because each of these routes has a different prefix length (subnet mask). They are
considered different destinations and the packet forwarding logic determine which route to use.
If the adaptive security appliance learns about multiple paths to the same destination from a single
routing protocol, such as RIP, the route with the better metric (as determined by the routing protocol)
is entered into the routing table.
Metrics are values associated with specific routes, ranking them from most preferred to least
preferred. The parameters used to determine the metrics differ for different routing protocols. The
path with the lowest metric is selected as the optimal path and installed in the routing table. If there
are multiple paths to the same destination with equal metrics, load balancing is done on these equal
cost paths.
If the adaptive security appliance learns about a destination from more than one routing protocol,
the administrative distances of the routes are compared and the routes with lower administrative
distance are entered into the routing table.
You can change the administrative distances for routes discovered by or redistributed into a routing
protocol. If two routes from two different routing protocols have the same administrative distance,
then the route with the lower default administrative distance is entered into the routing table. In the
case of EIGRP and OSPF routes, if the EIGRP route and the OSPF route have the same
administrative distance, then the EIGRP route is chosen by default.
Administrative distance is a route parameter that the adaptive security appliance uses to select the best
path when there are two or more different routes to the same destination from two different routing
protocols. Because the routing protocols have metrics based on algorithms that are different from the
other protocols, it is not always possible to determine the “best path” for two routes to the same
destination that were generated by different routing protocols.
Each routing protocol is prioritized using an administrative distance value. Table 18-1 shows the default
administrative distance values for the routing protocols supported by the adaptive security appliance.
Table 18-1 Default Administrative Distance for Supported Routing Protocols
Route Source Default Administrative Distance
Connected interface 0
Static route 1
EIGRP Summary Route 5

Table of Contents

Other manuals for Cisco 5510 - ASA SSL / IPsec VPN Edition

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco 5510 - ASA SSL / IPsec VPN Edition and is the answer not in the manual?

Cisco 5510 - ASA SSL / IPsec VPN Edition Specifications

General IconGeneral
BrandCisco
Model5510 - ASA SSL / IPsec VPN Edition
CategoryFirewall
LanguageEnglish

Related product manuals