Distribute List - Fortinet FortiGate FortiGate-500 Administration Manual

Fortinet fortigate fortigate-500: user guide
Hide thumbs Also See for FortiGate FortiGate-500:
Table of Contents

Advertisement

Router
10

Distribute list

FortiGate-500 Administration Guide
Password
Key-chain
To configure a RIP interface
1
Go to Router > RIP > Interface.
2
Select the edit icon beside an Interface to configure that interface.
3
Select a Send Version if you want to override the default send version for this
interface.
4
Select a Receive Version if you want to override the default receive version for this
interface.
5
Select the Split-Horizon check box to enable split horizon.
6
Select either Regular or Poisoned reverse to set the split horizon type.
7
Select the Authentication mode.
8
Select Password and enter a password (key) if this interface is using RIP version 2
and if you are configuring only one key for this interface and do not want to use a key
chain.
9
Select Key-chain and select the key chain to use if this interface is using RIP version 2
and you want to use key chains for authentication for this interface.
Select OK.
Use distribute lists to filter incoming or outgoing updates using an access list or a
prefix list. If you do not specify an interface, the filter will be applied to all interfaces in
the current virtual domain.
Note: By default, all distribute lists for the root virtual domain are displayed. If you create
additional virtual domains, the distribute lists belonging to the current virtual domain only are
displayed. To view the settings associated with a different virtual domain, go to System > Virtual
Domain > Virtual Domains and select the virtual domain.
You must configure the access list or prefix list that you want the distribute list to use
before you configure the distribute list. For more information on configuring access
lists and prefix lists, see
Figure 62: RIP Distribute list
Enter a password (key) to use for authentication for RIP version 2
packets sent and received by this interface. Enter a password here when
you only want to configure one key. The key can be up to 35 characters
long.
Enter the name of the key chain to use for authentication for RIP version
2 packets sent and received by this interface. Use key chains when you
want to configure multiple keys. For information on how to configure key
chains, see
"Key chain list" on page
"Access list" on page 158
01-28006-0007-20041105
164.
and
"Prefix list" on page
RIP
159.
155

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents