Protect Your PIX - Page 5

 By Cisco Press
Page 5 of 5   |  Back to Page 1
Print Article

rip Commands
You added commands to disable RIP on all interfaces. Notice that each interface has two lines associated with that interface: a no rip interface_name passive and a no rip interface_name default command. Each one of these commands accomplishes a different objective. The no rip interface_name passive command causes the PIX to stop listening to RIP updates. The no rip interface_name default command causes the PIX to stop broadcasting known routes through RIP.

RIPv1 and RIPv2 are both available on the PIX through the rip command. Use the no form of the rip command to disable a portion of RIP. Use the show rip command to show the current RIP entries and the clear rip command to clear RIP tables. The full syntax of this command is:

 rip interface_name default | passive [version [1 | 2]]
     [authentication [text | md5 key ( key_id)]]

The parameters and keyword meanings are listed in Table 4-2:

Command Description
interface_nameThe interface to which this command should be applied.
defaultBroadcasts a default route on the interface.
passiveEnables passive RIP (listening mode) and propagates the RIP tables based on these updates.
version</td>RIP version 1 or 2. Version 2 must be used if encryption is required.
authenticationEnables RIP version 2 authentication.
textSends RIP updates as clear text. This is not a recommended option.
md5Sends RIP update packets using MD5 encryption. Version 2 only.
keyThis is the key used to encrypt RIP updates for version 2.
key_idThe key identification value. Both sides must use the same key. Version 2 only.

pager lines Command
The pager lines command specifies how many lines are shown when a show config command is issued before a more prompt appears. Although this can be set to almost any value, 24 works well when using standard Telnet applications.

Cisco Secure Internet Security Solutions -- Click to go to publisher's site --
In our next installment of Cisco Secure Internet Security Solutions - Chapter 4, we will look at AAA commands, as well as additional Dual DMZ configuration considerations.

This article was originally published on Oct 3, 2001
Get the Latest Scoop with Networking Update Newsletter