Logo
programming4us
programming4us
programming4us
programming4us
Home
programming4us
XP
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server
programming4us
Windows Phone
 
Windows Server

Routing with Windows Server 2003 : Configuring and Managing Routing Protocols (part 1) - Configuring RIP

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
3/20/2011 4:15:26 PM

Understanding Routing Protocols

In Routing And Remote Access, routing protocols provide communication between routers. Windows Server 2003 includes four routing protocols that can be added to the Routing And Remote Access service: the dynamic routing protocols RIP and OSPF, the multicast routing protocol IGMP Router And Proxy, and DHCP Relay Agent.

Adding and Configuring Routing Protocols

To configure a routing protocol, you must first add the routing protocol to the Routing And Remote Access console. You perform this task by right-clicking the General node within IP Routing in the Routing And Remote Access console and clicking New Routing Protocol, as shown in Figure 1.

Figure 1. Making a routing protocol available for configuration


Once the routing protocol is available for configuration in the Routing And Remote Access console, you must enable the protocol on the appropriate network interfaces. You perform this task by right-clicking the new protocol in the console tree and then clicking New Interface on the shortcut menu. After the protocol has been enabled on the appropriate interfaces, you can configure the routing protocol through the protocol properties or the interface properties.

Configuring RIP

RIP is a dynamic routing protocol that helps routers determine the best path through which to send given data. Routes to destinations are chosen according to lowest cost. By default, this cost is determined by the number of hops or routers between endpoints; however, you can manually adjust the cost of any route as needed.

Importantly, RIP discards routes that are determined to have a cost higher than 15. This feature effectively limits the size of the network in which RIP can operate. Another important feature of RIP is that RIP-enabled routers advertise their entire routing tables to each other every 30 seconds. The service therefore generates a substantial amount of network traffic.

RIP Environment

A RIP routed environment is best suited to a small-to-medium-sized, multipath, dynamic IP internetwork:

  • A small-to-medium-sized internetwork is defined as 10 to 50 networks. In addition, the diameter of a RIP network cannot exceed 15 routers.

  • Multipath means that multiple paths are available for packets to travel between any two endpoints on the internetwork.

  • Dynamic means that the topology of the internetwork changes over time.

Advantages and Disadvantages of RIP

The main advantage of RIP is that it is easy to deploy. You can implement it on your network simply by enabling the protocol on each router. However, RIP does not scale well to large networks because of the 15-hop limitation. Other disadvantages of RIP include its high convergence times in medium-sized networks and its inability to factor costs other than hops (such as bandwidth) into the route cost metric.

Managing RIP Security

RIP includes a number of configurable security features, including authentication, peer filtering, route filters, and neighbors.

Tip

You need to be familiar with these RIP security features for the exam.


RIP Authentication

To prevent the corruption of RIP routes by an unauthorized RIP router or a malicious attacker, you can configure RIP router interfaces to use simple password authentication. Received RIP announcements that do not match the configured password are discarded. Note, however, that the password is sent in plaintext. Any user with a network sniffer such as Network Monitor can capture the RIP announcements and view the password.

You configure RIP authentication by selecting the Activate Authentication check box and specifying a password on the General tab of the RIP interface properties dialog box, as shown in Figure 2.

Figure 2. Activating RIP authentication


Peer Filtering

You can configure each RIP router with a list of routers (designated by IP address) from which RIP announcements are accepted. By default, RIP announcements from all sources are accepted. By configuring a list of RIP peers, RIP announcements from unauthorized RIP routers are discarded.

You configure RIP peer filtering on the Security tab of the global RIP Properties dialog box, as shown in Figure 3.

Figure 3. Peer filtering in RIP


Route Filters

You can configure route filters on each RIP interface so that the only routes considered for addition to the routing table are those that reflect reachable network IDs within the internetwork. For example, if an organization is using subnets of the private network ID 10.0.0.0, route filtering can be used so that the RIP routers discard all routes except those within the 10.0.0.0 network ID.

You configure route filters on the Security tab of the RIP Properties dialog box, as shown in Figure 4.

Figure 4. Route filtering in RIP


Neighbors

By default, RIP either broadcasts (RIP version 1 or RIP version 2) or multicasts (RIP version 2 only) announcements. To prevent RIP traffic from being received by any node except neighboring RIP routers, the server running Routing And Remote Access can unicast RIP announcements.

You configure RIP neighbors on the Neighbors tab of the RIP Properties dialog box, as shown in Figure 5.

Figure 5. Configuring RIP unicast message recipients, or neighbors

Other -----------------
- Routing with Windows Server 2003 : Configuring NAT
- Windows Server 2008 R2 : Choosing Between Traditional VPN Technologies and DirectAccess
- DirectAccess in Windows Server 2008 R2 (part 2)
- DirectAccess in Windows Server 2008 R2 (part 1)
- Understanding Network Services and Active Directory Domain Controller Placement for Exchange Server 2010 : Understanding AD Functionality Modes and Their Relationship to Exchange Server Groups
- Understanding Network Services and Active Directory Domain Controller Placement for Exchange Server 2010 : Exploring DSAccess, DSProxy, and the Categorizer
- Understanding Network Services and Active Directory Domain Controller Placement for Exchange Server 2010 : Defining the Global Catalog (part 2)
- Understanding Network Services and Active Directory Domain Controller Placement for Exchange Server 2010 : Defining the Global Catalog (part 1)
- Understanding Network Services and Active Directory Domain Controller Placement for Exchange Server 2010 : Global Catalog and Domain Controller Placement
- New SOA Capabilities in BizTalk Server 2009: UDDI Services (part 3) - Dynamic endpoint resolution via UDDI
 
 
Top 10
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
 
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server