Motorola WS2000 - Wireless Switch - Network Management Device System Reference Manual page 66

Wireless switch
Hide thumbs Also See for WS2000 - Wireless Switch - Network Management Device:
Table of Contents

Advertisement

4-12 WS2000 Wireless Switch System Reference Guide
1. Select the
RIP Type
No RIP
Depending on the
lows the switch's router from exchanging routing information with other routers. Routing
information may not be appropriate to share, for example, if the switch manages a private
LAN.
RIP v1
RIP version 1 is a mature, stable, and widely supported protocol. It is well suited for use in
stub networks and in small autonomous systems that do not have enough redundant paths
to warrant the overhead of a more sophisticated protocol.
RIP v2 (v1
RIP version 2 (compatible with version 1) is an extension of RIP v1's capabilities, but it is still
compat)
compatible with RIP version 1. RIP version 2 increases the amount of packet information to
provide a simple authentication mechanism to secure table updates.
RIP v2
RIP version 2 enables the use of a simple authentication mechanism to secure table
updates. More importantly, RIP version 2 supports subnet masks, a critical feature that is not
available in RIP version 1. This selection is not compatible with RIP version 1 support.
2. Select a routing direction from the RIP Direction drop-down menu.
(receive only), and
3. If
RIP v2
or
becomes active. Select the type of authentication to use from the Authentication Type drop-down menu.
Available options are:
None
Simple
MD5
4. If the
Simple
in the
Password (Simple Authentication)
5. If the
MD5
authentication method is selected, fill in the
value between 0 and 256 into the
characters into the
6. Click the
Ok
from the pull-down menu to be one of the following values.
RIP Direction
TX only
(transmit only) are available options.
RIP v2 (v1 compat)
is the selected RIP type, the
This option disables the RIP authentication.
This option enable RIP version 2's simple authentication mechanism.
This setting activates the
This option enables the MD5 algorithm for data verification. MD5 takes as input a mes-
sage of arbitrary length and produces a 128-bit fingerprint. The MD5 algorithm is
intended for digital signature applications, in which a large file must be compressed in a
secure manner before being encrypted with a private (secret) key under a public-key cryp-
tographic system. The MD5 setting activates the
keys (below).
authentication method is selected, specify a password of up to 15 alphanumeric characters
MD5 ID
MD5 Auth Key
field.
button to return to the Routing screen.
setting, the
No RIP
option partially or completely disal-
RIP v2 Authentication
Password (Simple Authentication)
RIP v2 Authentication
field.
Key #1
and
field. Type in any string consisting of 16 alphanumeric
Both
(for both directions),
area of the screen
field.
settings for
Key #2
fields. Type in any numeric
Rx only

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents