Routing and WAN connections
BAT54-Rail/F..
Release
7.54
06/08
11.2
IP routing
357
The router transmits the appropriate data packets to the IP address and
network mask to this remote station.
D If the remote station is a router in another network or an individual
workstation computer the name of the remote station.
D If the router on the network cannot address the remote station itself,
then the IP address of another router which knows the path to the des-
tination network is entered.
The router name indicates what should happen with the data packets
that match the IP address and network mask.
D Routes with the entry '0.0.0.0' identify exclusion routes. Data packets
for this “zero route“ are rejected and are not routed any further. That
way routes which are forbidden on the Internet (private address spac-
es, e.g. '10.0.0.0'), for example, are excluded from transmission.
D If an IP address is input as router name, this is a locally available rout-
er, which is responsible for transfer of the relevant data packets.
D Distance
Number of routers between your own and the destination router. This
value is often equated with the cost of the transmission and used to dis-
tinguish between inexpensive and expensive call paths for wide-area
connections. The distance values entered are propagated as follows:
D All networks which can be reached while a connection exists to a des-
tination network are propagated with a distance of 1.
D All non-connected networks are propagated with the distance entered
in the routing table (but with a minimum distance of 2) as long as a free
transmitting channel is still available.
D The remaining networks are propagated with a distance of 16
(= unreachable) if there are no longer any channels available.
D Remote stations connected using proxy ARP are an exception to this.
These “proxy hosts“ are not propagated at all.
D Masquerading
Use the 'Masquerade' option in the routing table to inform the router
which IP addresses to use when transferring packets from local net-
works.
For further information see the section ’IP masquerading’ → page 369.