IP Routing: RIP Configuration Guide
IP Routing: RIP Configuration Guide
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,
INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH
THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY,
CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of
the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS.
CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT
LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS
HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network
topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional
and coincidental.
All printed copies and duplicate soft copies of this document are considered uncontrolled. See the current online version for the latest version.
Cisco has more than 200 offices worldwide. Addresses and phone numbers are listed on the Cisco website at www.cisco.com/go/offices.
The documentation set for this product strives to use bias-free language. For purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on
age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that
is hardcoded in the user interfaces of the product software, language used based on standards documentation, or language that is used by a referenced third-party product.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL:
https://www.cisco.com/c/en/us/about/legal/trademarks.html. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a
partnership relationship between Cisco and any other company. (1721R)
© 2022 Cisco Systems, Inc. All rights reserved.
CONTENTS
Short Description 2
Configuring RIPv2 36
Configuring Frame Relay on a Serial Subinterface 37
Configuring IP with MD5 Authentication for RIPv2 and IP-RIP Delay on a Frame Relay
Subinterface 38
Configuration Examples for RIP 40
Route Summarization Example 40
Split Horizon Examples 41
Address Family Timers Example 42
Example: IP-RIP Delay Start on a Frame Relay Interface 43
Additional References 43
Feature Information for Configuring RIP 44
Glossary 45
Note For CUBE feature support information in Cisco IOS XE Bengaluru 17.6.1a and later releases, see Cisco
Unified Border Element IOS-XE Configuration Guide.
Note The documentation set for this product strives to use bias-free language. For purposes of this documentation
set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial
identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be
present in the documentation due to language that is hardcoded in the user interfaces of the product software,
language used based on standards documentation, or language that is used by a referenced third-party product.
Feature Information
Use Cisco Feature Navigator to find information about feature support, platform support, and Cisco software
image support. An account on Cisco.com is not required.
Related References
• Cisco IOS Command References, All Releases
Short Description
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and
other countries. To view a list of Cisco trademarks, go to this URL: https://www.cisco.com/c/en/us/about/
legal/trademarks.html. Third-party trademarks mentioned are the property of their respective owners. The use
of the word partner does not imply a partnership relationship between Cisco and any other company. (1721R)
from a different routing protocol with a better administrative distance than IPv6 RIP, the RIP route will not
be added to the IPv6 RIB but the RIP route will still exist in the IPv6 RIP RIB.
SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 unicast-routing
4. interface type number
5. ipv6 rip name enable
DETAILED STEPS
Router> enable
Step 4 interface type number Specifies the interface type and number, and enters interface
configuration mode.
Example:
Step 5 ipv6 rip name enable Enables the specified IPv6 RIP routing process on an
interface.
Example:
DETAILED STEPS
Router> enable
Step 3 ipv6 router rip word Configures an IPv6 RIP routing process and enters router
configuration mode for the IPv6 RIP routing process.
Example:
• Use the wordargument to identify a specific IPv6 RIP
Router(config)# ipv6 router rip process1 routing process.
Router(config-if)# exit
Step 6 interface type number Specifies the interface type and number, and enters interface
configuration mode.
Example:
Step 7 ipv6 rip name default-information {only | originate} (Optional) Originates the IPv6 default route (::/0) into the
[metric metric-value] specified RIP routing process updates sent out of the
specified interface.
Example:
Note To avoid routing loops after the IPv6 default
Router(config-if)# ipv6 rip process1 route (::/0) is originated out of any interface, the
default-information originate routing process ignores all default routes
received on any interface.
DETAILED STEPS
Step 2 show ipv6 route [ipv6-address| ipv6-prefix/prefix-length| (Optional) Displays the current contents of the IPv6 routing
protocol | interface-type interface-number] table.
Example: • In this example, only IPv6 RIP routes are displayed.
Step 4 debug ipv6 rip [interface-type interface-number] (Optional) Displays debugging messages for IPv6 RIP
routing transactions.
Example:
In the following example, output information about all current IPv6 RIP processes is displayed using
the show ipv6 rip command:
Device> show ipv6 rip
In the following example, output information about a specified IPv6 RIP process database is displayed
using the show ipv6 rip command with the name argument and the database keyword. In the
following output for the IPv6 RIP process named process1, timer information is displayed, and route
2001:DB8::16/64 has a route tag set:
Device> show ipv6 rip process1 database
In the following example, output information for a specified IPv6 RIP process is displayed using the
show ipv6 rip command with the name argument and the next-hops keyword:
Device> show ipv6 rip process1 next-hops
Additional References
The following sections provide references related to configuring Routing Information Protocol.
Related Documents
IPv6 Routing: RIP for IPv6 Cisco IOS IP Routing: RIP Configuration Guide
RIP commands: complete command syntax, command Cisco IOS IP Routing: RIP Command Reference
mode, command history, defaults, usage guidelines, and
examples
Standards
Standard Title
None --
MIBs
No new or modified MIBS are supported and To locate and download MIBs for selected platforms, Cisco
support for existing MIBs has not been IOS releases, and feature sets, use Cisco MIB Locator found
modified. at the following URL:
http://www.cisco.com/go/mibs
RFCs
RFC Title
Technical Assistance
Description Link
IPv6 Routing: RIP for IPv6 12.2(2)T RIP enhancements for IPv6 include
(RIPng) support for IPv6 addresses and
12.2(17a)SX1
prefixes, and the use of the
12.2(25)SEA all-RIP-devices multicast group
address FF02::9 as the destination
12.2(25)SG
address for RIP update messages.
12.2(33)SRA
The following commands were
12.3 introduced or modified: debug ipv6
rip, ipv6 rip default-information,
15.0(2)SG
ipv6 rip enable, ipv6 router rip,
Cisco IOS XE Release 2.1 ipv6 unicast-routing,
maximum-paths, show ipv6 rip,
Cisco IOS XE Release 3.2.0SG
show ipv6 route.
from a different routing protocol with a better administrative distance than IPv6 RIP, the RIP route will not
be added to the IPv6 RIB but the RIP route will still exist in the IPv6 RIP RIB.
Note You must to advertise a route with metric of 15 or less. A RIP router always adds an interface cost--the default
is 1--onto the metric of a received route. If you advertise a route with metric 15, your neighbor will add 1 to
it, making a metric of 16. Because a metric of 16 is unreachable, your neighbor will not install the route in
the routing table.
If no metric is specified, then the current metric of the route is used. To find the current metric of the route,
enter the show ipv6 route command.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. ipv6 rip word enable
5. redistribute protocol [process-id] {level-1 | level-1-2| level-2} [metric metric-value]
[metric-type{internal | external}] [route-map map-name]
DETAILED STEPS
Router> enable
Step 3 interface type number Specifies the interface type and number, and enters interface
configuration mode.
Example:
Step 4 ipv6 rip word enable Enables an IPv6 Routing Information Protocol (RIP) routing
process on an interface.
Example:
Step 5 redistribute protocol [process-id] {level-1 | level-1-2| Redistributes the specified routes into the IPv6 RIP routing
level-2} [metric metric-value] [metric-type{internal | process.
external}] [route-map map-name]
• The protocol argument can be one of the following
Example: keywords: bgp, connected, isis, rip, or static.
SUMMARY STEPS
1. enable
2. configure terminal
3. route-map map-tag [permit | deny] [sequence-number]
4. match ipv6 address {prefix-list prefix-list-name | access-list-name
5. set tag tag-value
DETAILED STEPS
Router> enable
Step 3 route-map map-tag [permit | deny] [sequence-number] Defines a route map, and enters route-map configuration
mode.
Example:
• Follow this step with a match command.
Router(config)# route-map bgp-to-rip permit 10
Step 4 match ipv6 address {prefix-list prefix-list-name | Specifies a list of IPv6 prefixes to be matched.
access-list-name
Example:
Step 5 set tag tag-value Sets the tag value to associate with the redistributed routes.
Example:
• The value of the optional ge keyword specifies the range of allowed prefix lengths from the value of the
ge keyword up to, and including, 128.
Note Note that the first condition must match before the other conditions take effect.
An exact match is assumed when the ge or le keywords are not specified. If only one keyword operand is
specified then the condition for that keyword is applied, and the other condition is not applied. The prefix-length
value must be less than the ge value. The ge value must be less than, or equal to, the le value. The le value
must be less than or equal to 128.
SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 prefix list prefix-list-name seq seq-number ] {deny ipv6-prefix/prefix-length | description text}
[ge ge-value] [le le-value
4. ipv6 prefix list prefix-list-name seq seq-number ] {deny ipv6-prefix/prefix-length | description text}
[ge ge-value] [le le-value
5. Repeat Steps 3 and 4 as many times as necessary to build the prefix list.
6. ipv6 router rip name
7. distribute-list prefix-list prefix-list-name in | out} [interface-type interface-number
DETAILED STEPS
Router> enable
Step 3 ipv6 prefix list prefix-list-name seq seq-number ] {deny Creates an entry in the IPv6 prefix list.
ipv6-prefix/prefix-length | description text} [ge ge-value]
[le le-value
Example:
Step 4 ipv6 prefix list prefix-list-name seq seq-number ] {deny Creates an entry in the IPv6 prefix list.
ipv6-prefix/prefix-length | description text} [ge ge-value]
[le le-value
Example:
Step 7 distribute-list prefix-list prefix-list-name in | out} Applies a prefix list to IPv6 RIP routing updates that are
[interface-type interface-number received or sent on an interface.
Example:
In the following example, output information about all current IPv6 RIP processes is displayed using
the show ipv6 rip command:
Device> show ipv6 rip
In the following example, output information about a specified IPv6 RIP process database is displayed
using the show ipv6 rip command with the name argument and the database keyword. In the
following output for the IPv6 RIP process named process1, timer information is displayed, and route
2001:DB8::16/64 has a route tag set:
Device> show ipv6 rip process1 database
In the following example, output information for a specified IPv6 RIP process is displayed using the
show ipv6 rip command with the name argument and the next-hops keyword:
Device> show ipv6 rip process1 next-hops
Additional References
Related Documents
Standard/RFC Title
MIBs
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco
MIB Locator found at the following URL:
http://www.cisco.com/go/mibs
Technical Assistance
Description Link
IPv6 Routing: Route Redistribution Cisco IOS XE Release 2.1 Routes may be specified by prefix,
using a route-map prefix list, or by
tag, using the route-map “match
tag” function.
The following commands were
introduced or modified:
distribute-list prefix-list, ipv6
prefix list, ipv6 rip enable, ipv6
router rip, match ipv6 address,
redistribute, route-map, set tag,
show ipv6 rip.
Note If RIP configuration does not have a network statement covering a specific interface, we recommend that you
do not configure RIP under that interface. If RIP is configured on such an interface, the redistribution of
route(s) from another routing protocol into RIP, received through that interface, does not work.
Authentication in RIP
The Cisco implementation of the Routing Information Protocol (RIP) Version 2 (RIPv2) supports authentication,
key management, route summarization, classless interdomain routing (CIDR), and variable-length subnet
masks (VLSMs).
By default, the software receives RIP Version 1 (RIPv1) and RIPv2 packets, but sends only RIPv1 packets.
You can configure the software to receive and send only RIPv1 packets. Alternatively, you can configure the
software to receive and send only RIPv2 packets. To override the default behavior, you can configure the RIP
version that an interface sends. Similarly, you can also control how packets received from an interface are
processed.
RIPv1 does not support authentication. If you are sending and receiving RIP v2 packets, you can enable RIP
authentication on an interface.
The key chain determines the set of keys that can be used on the interface. Authentication, including default
authentication, is performed on that interface only if a key chain is configured. For more information on key
chains and their configuration, see the “Managing Authentication Keys” section in the “Configuring IP Routing
Protocol-Independent Features” chapter in the Cisco IOS IP Routing: Protocol-Independent Configuration
Guide.
Cisco supports two modes of authentication on an interface on which RIP is enabled: plain-text authentication
and message digest algorithm 5 (MD5) authentication. Plain-text authentication is the default authentication
in every RIPv2 packet.
Note Do not use plain text authentication in RIP packets for security purposes, because the unencrypted authentication
key is sent in every RIPv2 packet. Use plain-text authentication when security is not an issue; for example,
you can use plain-text authentication to ensure that misconfigured hosts do not participate in routing.
You can adjust the IP routing support in the Cisco software to enable faster convergence of various IP routing
algorithms, and hence, cause quicker fallback to redundant devices. The total effect is to minimize disruptions
to end users of the network in situations where quick recovery is essential
In addition, an address family can have timers that explicitly apply to that address family (or Virtual Routing
and Forwarding [VRF]) instance). The timers-basic command must be specified for an address family or the
system defaults for the timers-basic command are used regardless of the timer that is configured for RIP
routing. The VRF does not inherit the timer values from the base RIP configuration. The VRF will always
use the system default timers unless the timers are explicitly changed using the timers-basic command.
• As specifically configured, advertising a summarized local IP address pool on the specified interface (on
a network access server) so that the address pool can be provided to dialup clients.
When RIP determines that a summary address is required in the RIP database, a summary entry is created in
the RIP routing database. As long as there are child routes for a summary address, the address remains in the
routing database. When the last child route is removed, the summary entry also is removed from the database.
This method of handling database entries reduces the number of entries in the database because each child
route is not listed in an entry, and the aggregate entry itself is removed when there are no longer any valid
child routes for it.
RIP Version 2 route summarization requires that the lowest metric of the "best route" of an aggregated entry,
or the lowest metric of all current child routes, be advertised. The best metric for aggregated summarized
routes is calculated at route initialization or when there are metric modifications of specific routes at
advertisement time, and not at the time the aggregated routes are advertised.
The ip summary-address rip routerconfiguration command causes the router to summarize a given set of
routes learned via RIP Version 2 or redistributed into RIP Version 2. Host routes are especially applicable
for summarization.
See the "Route Summarization Example, on page 40" section at the end of this chapter for examples of using
split horizon.
You can verify which routes are summarized for an interface using the show ip protocols EXEC command.
You can check summary address entries in the RIP database. These entries will appear in the database only
if relevant child routes are being summarized. To display summary address entries in the RIP routing database
entries if there are relevant routes being summarized based upon a summary address, use the show ip rip
database command in EXEC mode. When the last child route for a summary address becomes invalid, the
summary address is also removed from the routing table.
Without neighbor authentication, unauthorized or deliberately malicious routing updates could compromise
the security of your network traffic. A security compromise could occur if an unfriendly party diverts or
analyzes your network traffic. For example, an unauthorized router could send a fictitious routing update to
convince your router to send traffic to an incorrect destination. This diverted traffic could be analyzed to learn
confidential information about your organization or merely used to disrupt your organization’s ability to
effectively communicate using the network. Neighbor authentication prevents any such fraudulent route
updates from being received by your router.
When neighbor authentication has been configured on a router, the router authenticates the source of each
routing update packet that it receives. This is accomplished by the exchange of an authenticating key (sometimes
referred to as a password) that is known to both the sending and the receiving router.
There are two types of neighbor authentication used: plain text authentication and Message Digest Algorithm
Version 5 (MD5) authentication. Both forms work in the same way, with the exception that MD5 sends a
"message digest" instead of the authenticating key itself. The message digest is created using the key and a
message, but the key itself is not sent, preventing it from being read while it is being transmitted. Plain text
authentication sends the authenticating key itself over the wire.
Note Note that plain text authentication is not recommended for use as part of your security strategy. Its primary
use is to avoid accidental changes to the routing infrastructure. Using MD5 authentication, however, is a
recommended security practice.
In plain text authentication, each participating neighbor router must share an authenticating key. This key is
specified at each router during configuration. Multiple keys can be specified with some protocols; each key
must then be identified by a key number.
In general, when a routing update is sent, the following authentication sequence occurs:
1. A router sends a routing update with a key and the corresponding key number to the neighbor router. In
protocols that can have only one key, the key number is always zero. The receiving (neighbor) router
checks the received key against the same key stored in its own memory.
2. If the two keys match, the receiving router accepts the routing update packet. If the two keys do not match,
the routing update packet is rejected.
MD5 authentication works similarly to plain text authentication, except that the key is never sent over the
wire. Instead, the router uses the MD5 algorithm to produce a "message digest" of the key (also called a
"hash"). The message digest is then sent instead of the key itself. This ensures that nobody can eavesdrop on
the line and learn keys during transmission.
Another form of neighbor router authentication is to configure key management using key chains. When you
configure a key chain, you specify a series of keys with lifetimes, and the Cisco IOS software rotates through
each of these keys. This decreases the likelihood that keys will be compromised. To find complete configuration
information for key chains, refer to the "Managing Authentication Keys" section in the Configuring IP Routing
Protocol-Independent Features module of the Cisco IOS IP Routing: Protocol-Independent Configuration
Guide.
that the device sends to the non-Cisco neighbor device is 0. The default behavior for a device configured to
establish RIPv2 neighbor sessions with a neighbor device using MD5 authentication is to start sending MD5
packets when the physical interface is up.
The IP-RIP Delay Start feature is often used when a Cisco device is configured to establish a RIPv2 neighbor
relationship using MD5 authentication with a non-Cisco device over a Frame Relay network. When RIPv2
neighbors are connected over Frame Relay, it is possible for the serial interface connected to the Frame Relay
network to be up while the underlying Frame Relay circuits are not yet ready to transmit and receive data.
When a serial interface is up and the Frame Relay circuits are not yet operational, any MD5 packets that the
device attempts to transmit over the serial interface are dropped. When MD5 packets are dropped because the
Frame Relay circuits over which the packets need to be transmitted are not yet operational, the sequence
number of the first MD5 packet received by the neighbor device after the Frame Relay circuits become active
will be greater than 0. Some non-Cisco devices will not allow an MD5-authenticated RIPv2 neighbor session
to start when the sequence number of the first MD5 packet received from the other device is greater than 0.
The differences in vendor implementations of MD5 authentication for RIPv2 are probably a result of the
ambiguity of the relevant RFC (RFC 2082) with respect to packet loss. RFC 2082 suggests that devices should
be ready to accept either a sequence number of 0 or a sequence number higher than the last sequence number
received. For more information about MD5 message reception for RIPv2, see section 3.2.2 of RFC 2082 at
the following url: http://www.ietf.org/rfc/rfc2082.txt.
The IP-RIP Delay Start feature is supported over other interface types such as Fast Ethernet and Gigabit
Ethernet.
Cisco devices allow an MD5-authenticated RIPv2 neighbor session to start when the sequence number of the
first MD5 packet received from the other device is greater than 0. If you are using only Cisco devices in your
network, you do not need to use the IP-RIP Delay Start feature.
Offset-list
An offset list is the mechanism for increasing incoming and outgoing metrics to routes learned via RIP. This
is done to provide a local mechanism for increasing the value of routing metrics. Optionally, you can limit
the offset list with either an access list or an interface.
Timers
Routing protocols use several timers that determine such variables as the frequency of routing updates, the
length of time before a route becomes invalid, and other parameters. You can adjust these timers to tune
routing protocol performance to better suit your internetwork needs. You can make the following timer
adjustments:
• The rate (time in seconds between updates) at which routing updates are sent
• The interval of time (in seconds) after which a route is declared invalid
• The interval (in seconds) during which routing information regarding better paths is suppressed
• The amount of time (in seconds) that must pass before a route is removed from the routing table
• The amount of time for which routing updates will be postponed
It also is possible to tune the IP routing support in the software to enable faster convergence of the various IP
routing algorithms, and, hence, quicker fallback to redundant routers. The total effect is to minimize disruptions
to end users of the network in situations where quick recovery is essential.
DETAILED STEPS
Device> enable
Step 3 router rip Enables a RIP routing process and enters router
configuration mode.
Example:
Step 6 offset-list [access-list-number | access-list-name] {in | out} (Optional) Applies an offset list to routing metrics.
offset [interface-type interface-number]
Step 7 timers basic update invalid holddown flush [sleeptime] (Optional) Adjusts routing protocol timers.
Example:
Device(config-router)# end
DETAILED STEPS
Device> enable
Step 4 version {1 | 2} Enables the Cisco software to send only RIP Version 2
(RIPv2) packets.
Example:
Device(config-router)# version 2
Step 5 exit Exits the router configuration mode and enters the global
configuration mode.
Example:
Device(config-router)# exit
Step 6 interface type number Specifies an interface and enters interface configuration
mode.
Example:
Step 7 ip rip send version [1] [2] Configures an interface to send only RIPv2 packets.
Example:
Step 8 ip rip receive version [1] [2] Configures an interface to accept only RIPv2 packets.
Example:
Step 10 ip rip authentication mode {text | md5} Configures the interface to use message digest algorithm
5 (MD5) authentication (or let it default to plain-text
Example:
authentication).
Device(config-if)# ip rip authentication mode md5
Device(config-if)# end
Note Supernet advertisement (advertising any network prefix less than its classful major network) is not allowed
in RIP route summarization, other than advertising a supernet learned in the routing tables. Supernets learned
on any interface that is subject to configuration are still learned. For example, the following summarization
is invalid: (invalid supernet summarization)
>
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. ip summary-address rip ip-address network-mask
5. exit
6. router rip
7. no auto-summary
8. end
DETAILED STEPS
Router> enable
Step 4 ip summary-address rip ip-address network-mask Specifies the IP address and network mask that identify the
routes to be summarized.
Example:
Router(config-if)# exit
Router(config-router)# no auto-summary
Router(config-router)# end
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. ip split-horizon
5. no ip split-horizon
6. end
DETAILED STEPS
Router> enable
Router(config-if)# ip split-horizon
Router(config-if)# no ip split-horizon
Router(config-if)# end
Note Split horizon for Frame Relay and SMDS encapsulation is disabled by default. Split horizon is not disabled
by default for interfaces using any of the X.25 encapsulations. For all other encapsulations, split horizon is
enabled by default.
In general, changing the state of the default is not recommended unless you are certain that your application
requires making a change in order to advertise routes properly. Remember that if split horizon is disabled on
a serial interface (and that interface is attached to a packet-switched network), you must disable split horizon
for all routers in any relevant multicast groups on that network.
Note Summarized network will not be advertised when split horizon is enabled.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. ip split-horizon
5. exit
6. router rip
7. no validate-update-source
8. end
DETAILED STEPS
Router> enable
Router(config-if)# ip split-horizon
Router(config-if)# exit
Router(config-router)# no validate-update-source
Router(config-router)# end
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. exit
5. router rip
6. output-delay milliseconds
7. end
DETAILED STEPS
Router> enable
Router(config-if)# exit
Step 6 output-delay milliseconds Configures interpacket delay for outbound RIP updates.
Example:
Router(config-router)# output-delay 8
Router(config-router)# end
To overcome these limitations, triggered extensions to RIP cause RIP to send information on the WAN only
when there has been an update to the routing database. Periodic update packets are suppressed over the interface
on which this feature is enabled. RIP routing traffic is reduced on point-to-point, serial interfaces. Therefore,
you can save money on an on-demand circuit for which you are charged for usage. Triggered extensions to
RIP partially support RFC 2091, Triggered Extensions to RIP to Support Demand Circuits .
Perform the following task to enable triggered extensions to RIP and to display the contents of the RIP private
database.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface serial controller-number
4. ip rip triggered
5. end
6. show ip rip database [prefix mask]
DETAILED STEPS
Router> enable
Router(config-if)# end
Step 6 show ip rip database [prefix mask] Displays the contents of the RIP private database.
Example:
ConfiguringIP-RIPDelayStartforRoutersConnectedbyaFrameRelayNetwork
The tasks in this section explain how to configure a router to use the IP-RIP Delay Start feature on a Frame
Relay interface.
Timesaver Cisco routers allow an MD5-authenticated RIPv2 neighbor session to start when the sequence number of the
first MD5 packet received from the other router is greater than 0. If you are using only Cisco routers in your
network, you do not need to use the IP-RIP Delay Start feature.
Prerequisites
Your router must be running Cisco IOS Release 12.4(12) or a later release.
Note The IP-RIP Delay Start feature is supported over other interface types such as Fast Ethernet and Gigabit
Ethernet. If your Cisco router cannot establish RIPv2 neighbor sessions using MD5 authentication with a
non-Cisco device, the IP-RIP Delay Start feature might resolve the problem.
Restrictions
The IP-RIP Delay Start feature is required only when your Cisco router is configured to establish a RIPv2
neighbor relationship with a non-Cisco device and you want to use MD5 neighbor authentication.
Configuring RIPv2
This required task configures RIPv2 on the router.
This task provides instructions for only one of the many possible permutations for configuring RIPv2 on your
router.
SUMMARY STEPS
1. enable
2. configure terminal
3. router rip
4. network ip-network
5. version {1 | 2}
6. [no] auto-summary
DETAILED STEPS
Router> enable
Step 3 router rip Enables a RIP routing process, which places you in router
configuration mode.
Example:
Step 5 version {1 | 2} Configures the software to receive and send only RIP
Version 1 or only RIP Version 2 packets.
Example:
Router(config-router)# no auto-summary
Note This task provides instructions for only one of the many possible permutations for configuring Frame Relay
on a subinterface. For more information about and instructions for configuring Frame Relay, see the Configuring
Frame Relay part of the Cisco IOS Wide-Area Networking Configuration Guide .
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. no ip address
5. encapsulation frame-relay [mfr number | ietf]
6. frame-relay lmi-type {cisco | ansi | q933a}
7. exit
8. interface type number/subinterface-number {point-to-point | multipoint}
9. frame-relay interface-dlci dlci [ietf | cisco]
DETAILED STEPS
Router> enable
Step 3 interface type number Specifies an interface and enters interface configuration
mode.
Example:
Router(config-if)# no ip address
Step 5 encapsulation frame-relay [mfr number | ietf] Specifies the type of Frame Relay encapsulation for the
interface.
Example:
Step 6 frame-relay lmi-type {cisco | ansi | q933a} Specifies the type of Frame Relay local management
interface (LMI) for the interface.
Example:
Router(config-if)# exit
Step 8 interface type number/subinterface-number Specifies a subinterface and the connection type for the
{point-to-point | multipoint} subinterface and enters subinterface configuration mode.
Example:
Step 9 frame-relay interface-dlci dlci [ietf | cisco] Assigns a data-link connection identifier (DLCI) to a Frame
Relay subinterface.
Example:
Configuring IP with MD5 Authentication for RIPv2 and IP-RIP Delay on a Frame Relay Subinterface
SUMMARY STEPS
1. enable
2. configure terminal
3. key chain name-of-chain
4. key number
5. key-string string
6. exit
7. exit
8. interface type number
9. no cdp enable
DETAILED STEPS
Device> enable
Step 3 key chain name-of-chain Specifies the name of a key chain and enters key chain
configuration mode.
Example:
Step 4 key number Specifies the key identifier and enters key chain key
configuration mode. The range is from 0 to 2147483647.
Example:
Device(config-keychain-key)# exit
Device(config-keychain)# exit
Step 10 ip address ip-address subnet-mask Configures an IP address for the Frame Relay subinterface.
Example:
Step 11 ip rip authentication mode {text | md5} Specifies the mode for RIPv2 authentication.
Example:
Step 12 ip rip authentication key-chain name-of-chain Specifies a previously configured key chain for Routing
Information Protocol Version (RIPv2) message digest
Example:
algorithm 5 (MD5) authentication.
Device (config-subif)# ip rip authentication
key-chain rip-md5
Step 13 ip rip initial-delay delay Configures the IP-RIP Delay Start feature on the interface.
The device will delay sending the first MD5 authentication
Example:
packet to the RIPv2 neighbor for the number of seconds
specified by the delay argument. The range is from 0 to
Device(config-subif)# ip rip initial-delay 45
1800.
Device(config-subif)# end
10.2.2.0/24, 10.1.2.0/24 and 10.1.1.0/24 can be summarized as shown below while sending the updates over
an interface.
Example 1
The following configuration shows a simple example of disabling split horizon on a serial link. In this example,
the serial link is connected to an X.25 network.
Router(config-if)# no ip split-horizon
Example 2
In the next example, the figure below illustrates a typical situation in which the no ip split-horizon interface
configuration command would be useful. This figure depicts two IP subnets that are both accessible via a
serial interface on Router C (connected to a Frame Relay network). In this example, the serial interface on
Router C accommodates one of the subnets via the assignment of a secondary IP address.
The Ethernet interfaces for Router A, Router B, and Router C (connected to IP networks 10.13.50.0,
10.155.120.0, and 10.20.40.0, respectively all have split horizon enabled by default, while the serial interfaces
connected to networks 172.16.1.0 and 192.168.1.0 all have split horizon disabled with the no ip split-horizon
command.The figure below shows the topology and interfaces.
In this example, split horizon is disabled on all serial interfaces. Split horizon must be disabled on Router C
in order for network 172.16.0.0 to be advertised into network 192.168.0.0 and vice versa. These subnets
overlap at Router C, interface S0. If split horizon were enabled on serial interface S0, it would not advertise
a route back into the Frame Relay network for either of these networks.
interface ethernet 1
ip address 10.13.50.1
!
interface serial 1
ip address 172.16.2.2
encapsulation frame-relay
no ip split-horizon
interface ethernet 2
ip address 10.155.120.1
!
interface serial 2
ip address 192.168.1.2
encapsulation frame-relay
no ip split-horizon
interface ethernet 0
ip address 10.20.40.1
!
interface serial 0
ip address 172.16.1.1
ip address 192.168.1.1 secondary
encapsulation frame-relay
no ip split-horizon
Additional References
The following sections provide references related to configuring Routing Information Protocol.
Related Documents
IPv6 Routing: RIP for IPv6 Cisco IOS IP Routing: RIP Configuration Guide
RIP commands: complete command syntax, command Cisco IOS IP Routing: RIP Command Reference
mode, command history, defaults, usage guidelines, and
examples
Standards
Standard Title
None --
MIBs
No new or modified MIBS are supported and To locate and download MIBs for selected platforms, Cisco
support for existing MIBs has not been IOS releases, and feature sets, use Cisco MIB Locator found
modified. at the following URL:
http://www.cisco.com/go/mibs
RFCs
RFC Title
Technical Assistance
Description Link
IP-RIP Delay 12.4(12), The IP-RIP Delay Start feature is used on Cisco routers to delay
Start the initiation of RIPv2 neighbor sessions until the network
15.0(1)M,
connectivity between the neighbor routers is fully operational,
12.2(33)SRE, thereby ensuring that the sequence number of the first MD5 packet
that the router sends to the non-Cisco neighbor router is 0. The
15.0(1)SY
default behavior for a router configured to establish RIPv2 neighbor
sessions with a neighbor router using MD5 authentication is to start
sending MD5 packets when the physical interface is up.
The following commands were introduced or modified: ip rip
initial-delay.
IP Summary 12.0(7)T 12.1(3)T The IP Summary Adddress for RIPv2 feature introduced the ability
Address for 12.1(14) 12.2(2)T to summarize routes. Summarizing routes in RIP Version 2
RIPv2 12.2(27)SBB improves scalability and efficiency in large networks. Summarizing
15.0(1)M 12.2(33)SRE IP addresses means that there is no entry for child routes (routes
15.0S that are created for any combination of the individual IP addresses
contained within a summary address) in the RIP routing table,
reducing the size of the table and allowing the router to handle
more routes.
The following commands were introduced or modified by this
feature: ip summary-address rip.
Triggered RIP 12.0(1)T 15.0(1)M Triggered RIP was introduced to overcome constant RIP updates
12.2(33)SRE 15.0S over expensive circuit-based WAN links. Triggered extensions to
RIP cause RIP to send information on the WAN only when there
has been an update to the routing database. Periodic update packets
are suppressed over the interface on which this feature is enabled.
RIP routing traffic is reduced on point-to-point, serial interfaces.
The following commands were introduced or modified: ip rip
triggered, show ip rip database.
Glossary
address family --A group of network protocols that share a common format of network address. Address
families are defined by RFC 1700.
IS-IS --Intermediate System-to-Intermediate System. OSI link-state hierarchical routing protocol based on
DECnet Phase V routing, where routers exchange routing information based on a single metric, to determine
network topology.
RIP --Routing Information Protocol.RIP is a dynamic routing protocol used in local and wide area networks.
VRF --VPN routing and forwarding instance. A VRF consists of an IP routing table, a derived forwarding
table, a set of interfaces that use the forwarding table, and a set of rules and routing protocols that determine
what goes into the forwarding table. In general, a VRF includes the routing information that defines a customer
VPN site that is attached to a PE router.
SUMMARY STEPS
1. enable
2. configure terminal
3. router rip
4. bfd all-interfaces
5. end
DETAILED STEPS
Router> enable
Step 3 router rip Configures the RIP routing process and enters router
configuration mode.
Example:
Step 4 bfd all-interfaces Enables BFD on all interfaces associated with the routing
process.
Example:
• RIPv2 registers with BFD and creates sessions for the
Router(config-router)# bfd all-interfaces neighbor when RIP updates are received. New
neighbors are automatically enabled for BFD when
the update packets are received.
Router(config-router)# end
!
interface GigabitEthernet 0/0/0
ip address 10.10.10.1 255.255.255.0
bfd interval 50 min_rx 50 multiplier 5
end
!
interface GigabitEthernet 0/0/1
ip address 10.10.20.1 255.255.255.0
bfd interval 50 min_rx 50 multiplier 5
end
!
router rip
version 2
redistribute connected
network 10.0.0.0
neighbor 10.10.20.2 bfd
bfd all-interfaces
no auto-summary
!
Additional References
Related Documents
Standards
Standard Title
None --
MIBs
None --
RFCs
RFC Title
None --
Technical Assistance
Description Link
BFD for RIPv2 Cisco IOS XE The BFD for RIPv2 Support feature is used to facilitate
Support Release 3.3 alternate path selection when a neighboring router is inactive.
The following commands were introduced or modified: bfd
all-interfaces, debug ip rip bfd events, neighbor (RIP),and
show ip rip neighbor.
all the routes in the same routing table. In other routing protocols, it is often required to keep the protocol-related
routes stored in separate routing tables.
The IPv6: RIPng VRF-Aware Support feature enables isolation, modularity, and potential performance
improvement by reducing the number of routes stored in a single routing table. It also allows a network
administrator to create different RIP routing tables and share the same protocol configuration stored in a single
RIP protocol configuration block.
DETAILED STEPS
Device> enable
Step 4 vrf definition vrf-name Configures a virtual routing and forwarding (VRF) routing
table instance and enters VRF configuration mode.
Example:
Device(config)# vrf definition vrf1
Step 5 address-family ipv6 Enters VRF address family configuration mode and enables
IPv6 address prefixes.
Example:
Device(config-vrf)# address-family ipv6
Step 6 exit Exits VRF address family configuration mode and returns
to VRF configuration mode.
Example:
Device(config-vrf-af)# exit
Step 8 ipv6 rip vrf-mode enable Enables VRF support for IPv6 RIP routing and enters RTR
entry configuration mode.
Example:
Device (config)# ipv6 rip vrf-mode enable
Step 9 ipv6 router rip rip-process-name Creates an IPv6 Routing Information Protocol (RIP)
routing process instance.
Example:
Device (config)# ipv6 router rip myrip
Step 10 exit Exits RTR entry configuration mode and returns to global
configuration mode.
Example:
Device (config-rtr)# exit
Step 11 interface type number Specifies the interface type and number and enters interface
configuration mode.
Example:
Device (config)# interface Ethernet 0/0
Step 12 vrf forwarding vrf-name Binds the interface to the specified VRF routing instance
table and removes all the Layer 3 interface configuration
Example:
that is available when the command is entered.
Device(config-if)# vrf forwarding vrf1
Step 16 debug ipv6 rip vrf vrf-name Displays debugging information related to VRF support
for the specified IPv6 RIP VRF routing table instance.
Example:
Device# debug ipv6 rip vrf vrf1
Step 17 show ipv6 rip vrf vrf-name next-hops Displays the next hops in the specified VRF RIPng routing
table.
Example:
Device# show ipv6 rip vrf vrf1 next-hops
Step 18 show ipv6 rip vrf vrf-name database Displays the associated RIP local routing information base
(RIB).
Example:
Device# show ipv6 rip vrf vrf1 database
Device> enable
Device# configure terminal
Device(config)# ipv6 unicast-routing
Device(config)# vrf definition vrf1
Device(config-vrf)# address-family ipv6
Device(config-vrf-af)# exit
Device(config-vrf)# exit
Device(config)# ipv6 rip vrf-mode enable
Device(config)# ipv6 router rip myrip
Device(config-rtr)# exit
Device(config)# interface Ethernet 0/0
Device(config-if)# vrf forwarding vrf1
Device(config-if)# ipv6 enable
Device(config-if)# ipv6 rip myrip enable
Device(config-if)# end
IPv6 Routing: RIP for IPv6 Cisco IOS IP Routing: RIP Configuration Guide
Standard/RFC Title
RFC 2080 RIPng for IPv6
Technical Assistance
Description Link
The Cisco Support website provides extensive online resources, including http://www.cisco.com/support
documentation and tools for troubleshooting and resolving technical issues
with Cisco products and technologies.
To receive security and technical information about your products, you can
subscribe to various services, such as the Product Alert Tool (accessed from
Field Notices), the Cisco Technical Services Newsletter, and Really Simple
Syndication (RSS) Feeds.
Access to most tools on the Cisco Support website requires a Cisco.com user
ID and password.
IPv6: RIPng 15.3(3)M When not virtual routing and forwarding (VRF) aware, IPv6 Routing
VRF-Aware Information Protocol (RIP), also known as RIP Next Generation (RIPng),
15.2(1)SY
Support works only with routes that are available in the default global routing table.
When operating in VRF mode, RIPng, creates a separate routing table for
each VRF instance. The IPv6: RIPng VRF-Aware Support feature enables
the availability of separate routing tables for every provider edge-customer
edge (PE-CE) scenario, thus allowing improved route protection, modularity,
and a potential reduction in the size of the routing table.
The following commands were introduced or modified: clear ipv6 rip,debug
ipv6 rip , ipv6 rip vrf-mode enable, and show ipv6 rip.
A R
auto-summary (RIP) command 29 RIP (Routing Information Protocol) 19, 21, 27, 29, 31, 40
IP 19, 21, 27, 29, 31, 40
authentication 21
E hop count 19
encapsulations 31 route summarization 29, 40
split horizon for Frame Relay and SMDS, RIP 31 (examples) 40
disabling 29
source IP address, disabling validation of 31
F version, specifying 27
Frame Relay, split horizonSMDS (Switched Multimegabit Data RIP for IPv6 3, 11
Service) 31 description 3, 11
disabled split horizon 31 RIP router metric 12
route authentication 21
RIP 21
I Routing Information Protocol (RIP) 12
IPv6 12
IP 20, 30
enabling 12
advertising, definition 20
split horizon, enabling and disabling 30
ip rip authentication mode command 27 S
ip rip triggered command 34
ip split-horizon command 30 secondary addresses 41
ip summary-address rip command 22 use in Frame Relay and SMDS (example) 41
IPv6 14 show ip rip database command 34
distribute lists 14 split horizon 23
prefix list operand keywords 14 enabling and disabling 23
summary addresses 22
entries, checking for 22
M
MD5 (Message Digest 5) authentication 21 T
RIP 21
message URL http 8, 43 timers basic (RIP) command 26
//www.cisco.com/cisco/web/support/index.html 8, 43
metrics 19 U
RIP 19
UDP (User Datagram Protocol) 20
using with RIP 20
O
offset-list command 26 V
validate-update-source command 31