EasyManua.ls Logo

Zte ZXR10 GER - Page 198

Zte ZXR10 GER
412 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
ZXR10 GER (V2.6.03) General Excellent Router User Manual Volume-I
176 Confidential and Proprietary Information of ZTE CORPORATION
3. To define a neighboring router with which to exchange
routing information, use neighbor command in RIP
configuration mode as shown in
Table 213 . To remove an
entry, use the no form of this command.
TABLE 213 NEIGHBOR COMMAND WINDOW
Command
Format
Command
Mode
Command Function
neighbor <ip-
address>
RIP Config This defines neighboring
router with which routing
information is exchanged
<ip-address> refers to IP address of a peer router with
which routing information exchanges.
This command permits the point-to-point (non-broadcast)
exchange of routing information, when use with combination
of passive-interface router configuration command, routing
information exchanges between a subset of routers and
access servers on a LAN.
Result: This configures a peer router with whom routing
information exchanges.
4. To enable authentication for RIP Version 2 packets and to
specify set of keys that uses on an interface, use ip rip
authentication key command in RIP interface configuration
mode as shown in
Table 214 . Use the no form of this
command to prevent authentication.
TABLE 214 IP RIP AUTHENTICATION KEY
Command
Format
Command
Mode
Command Function
ip rip
authentication
key <key>
RIP Interface
Config
This designates a key that
can be used for simple text
authentication of an
interface
<key> refers to authentication key in characters ranges
from <1- 16>.
This command specifies, to accept only those RIP update
packets coming from the peer that is authenticated.
Result: This configures authentication for RIP routing
updates.
5. To specify the type of authentication used in RIP Version 2
packets, use ip rip authentication mode command in RIP
interface configuration mode as shown in below table. Use
the no form of this command to restore clear text
authentication.

Table of Contents

Related product manuals