Small Office Remote Access Switch 93CONFIGURING B ASIC IP ROUTINGIP Network InterfacesThe following table provides the possible choices for IP RIP v2 authentication control* This is the default switch.IP RIP V 2 A UTHENTICATION K EYIf IP RIP is enabled for a specific interface, this key is required if the following condition has beenmet: the “IP RIP v2 Authentication Control” has been configured with a value other than “NoAuthentication.” The authentication key is a user-defined password, 1-16 characters in length.IP RIP HOST ROUTES PROPAGATION SCHEMEIf RIP is enabled for a WAN interface, this is required. This controls how the IP RIP packets will bepropagated. The default value is “Host Routes Propagation is currently DISABLED.” With thedefault, WAN local routes are propagated as subnetwork routes. If Host routes propagation isenabled, host routes will be propagated on other network interfaces only while each remote IPdevice is connected to the CyberSWITCH.When the IP RIP host propagation scheme is enabled, it will allow multiple systems on the sameLAN to work properly. IP RIP information is then advertised as multiple host routes as theyconnect to the CyberSWITCH.For more information, refer to the diagrams and explanation provided on WAN interfacesbeginning on page 97.IP NETWORK INTERFACE BACKGROUND I NFORMATIONNetwork Interface is a term used to represent the physical connection of the system to a datanetwork. For example, the Ethernet resource provides a network interface to an Ethernet LAN. TheISDN lines provide network interfaces to multiple remote networks. Because of their switchednature, the ISDN lines provide virtual network interfaces. That is, the same physical ISDN line canactually connect to different remote networks by dialing a different phone number.A bridge device refers to its network interfaces as ports. It simply forwards packets from one portto another without looking at the network protocol information. A typical ISDN bridge has oneEthernet port and one ISDN port.In a network that uses the IP protocol for communication, a flexible network interface structure canbe implemented. An IP network uses the IP network address as a basis for device communication.IP networks can be segmented into a hierarchical structure by using the subnet addressingprovided by the IP protocol. IP hosts can be assigned to a specific subnet based on managementand user needs. All IP hosts connected to a virtual or physical subnet must have the same subnetaddress.Type MeaningNo Authentication * This control type indicates that IP RIP v1 andunauthenticated IP RIP v2 messages are accepted.Simple Password This control type indicates that IP RIP v1 messagesand IP RIP v2 messages which pass authenticationtest are accepted. The authentication test is doneusing a simple password.