EasyManuals Logo

Cisco 5510 - ASA SSL / IPsec VPN Edition Configuration Guide

Cisco 5510 - ASA SSL / IPsec VPN Edition
1822 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #409 background imageLoading...
Page #409 background image
22-3
Cisco ASA 5500 Series Configuration Guide using ASDM
OL-20339-01
Chapter 22 Configuring RIP
Guidelines and Limitations
Guidelines and Limitations
This section includes the guidelines and limitations for this feature.
Context Mode Guidelines
Supported in single and multiple context mode.
Firewall Mode Guidelines
Supported in routed and transparent mode.
IPv6 Guidelines
Does not support IPv6.
Additional Guidelines
The following information applies to RIP Version 2 only:
If using neighbor authentication, the authentication key and key ID must be the same on all neighbor
devices that provide RIP Version 2 updates to the interface.
With RIP Version 2, the adaptive security appliance transmits and receives default route updates
using the multicast address 224.0.0.9. In passive mode, it receives route updates at that address.
When RIP Version 2 is configured on an interface, the multicast address 224.0.0.9 is registered on
that interface. When a RIP Version 2 configuration is removed from an interface, that multicast
address is unregistered.
Limitations
RIP has the following limitations:
The adaptive security appliance cannot pass RIP updates between interfaces.
RIP Version 1 does not support variable-length subnet masks.
RIP has a maximum hop count of 15. A route with a hop count greater than 15 is considered
unreachable.
RIP convergence is relatively slow compared to other routing protocols.
You can only enable a single RIP process on the adaptive security appliance.
Configuring RIP
This section describes how to enable and restart the RIP process on the adaptive security appliance.
After you have enabled RIP, see the “Customizing RIP” section on page 22-5, to learn how to customize
the RIP process on the adaptive security appliance.
Note If you want to redistribute a route by defining which of the routes from the specified routing protocol are
allowed to be redistributed into the target routing process, you must first generate a default route. For
information, see the “Configuring a Default Static Route” section on page 19-7 and then define a route
map. For information, see the “Defining a Route Map” section on page 20-4.

Table of Contents

Other manuals for Cisco 5510 - ASA SSL / IPsec VPN Edition

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco 5510 - ASA SSL / IPsec VPN Edition and is the answer not in the manual?

Cisco 5510 - ASA SSL / IPsec VPN Edition Specifications

General IconGeneral
BrandCisco
Model5510 - ASA SSL / IPsec VPN Edition
CategoryFirewall
LanguageEnglish

Related product manuals