Template:Networking rutos manual routing: Difference between revisions
No edit summary |
No edit summary |
||
(50 intermediate revisions by 7 users not shown) | |||
Line 1: | Line 1: | ||
{{Template: | {{Template:Networking_rutos_manual_fw_disclosure | ||
| | | fw_version = {{{series}}}_R_00.02.05 | ||
| series = {{{series}}} | |||
}} | }} | ||
==Summary== | ==Summary== | ||
Line 44: | Line 39: | ||
<td>Interface</td> | <td>Interface</td> | ||
<td>network interface; default: <b>lan</b></td> | <td>network interface; default: <b>lan</b></td> | ||
<td> | <td>The zone where the target network resides</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>Target<span class="asterisk">*</span></td> | <td>Target<span class="asterisk">*</span></td> | ||
<td>ip4; default: <b>none</b></td> | <td>ip4; default: <b>none</b></td> | ||
<td> | <td>The address of a destination network.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
Line 83: | Line 78: | ||
<li><b>prohibit</b> - used to prohibit traffic to specified host or network. When a destination is prohibited, the kernel sends a 'Network is unreachable' response the source address.</li> | <li><b>prohibit</b> - used to prohibit traffic to specified host or network. When a destination is prohibited, the kernel sends a 'Network is unreachable' response the source address.</li> | ||
<li><b>blackhole</b> - packets that match this type of route are discarded without any response.</li> | <li><b>blackhole</b> - packets that match this type of route are discarded without any response.</li> | ||
<li><b>anycast</b> - provides a possibility to route incoming requests to multiple different network locations.</li> | <li><b>anycast</b> - provides a possibility to route incoming requests to a multiple different network locations.</li> | ||
<li><b>-- custom --</b> - does not use any of the predefined route types.</li> | <li><b>-- custom --</b> - does not use any of the predefined route types.</li> | ||
</ul> | </ul> | ||
Line 153: | Line 148: | ||
<td>Interface</td> | <td>Interface</td> | ||
<td>network interface; default: <b>lan</b></td> | <td>network interface; default: <b>lan</b></td> | ||
<td> | <td>The zone where the target network resides</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>Target</td> | <td>Target</td> | ||
<td>ip6; default: <b>none</b></td> | <td>ip6; default: <b>none</b></td> | ||
<td> | <td>The address of a destination network.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
Line 187: | Line 182: | ||
<li><b>prohibit</b> - used to prohibit traffic to specified host or network. When a destination is prohibited, the kernel sends a 'Network is unreachable' response the source address.</li> | <li><b>prohibit</b> - used to prohibit traffic to specified host or network. When a destination is prohibited, the kernel sends a 'Network is unreachable' response the source address.</li> | ||
<li><b>blackhole</b> - packets that match this type of route are discarded without any response.</li> | <li><b>blackhole</b> - packets that match this type of route are discarded without any response.</li> | ||
<li><b>anycast</b> - provides a possibility to route incoming requests to multiple different network locations.</li> | <li><b>anycast</b> - provides a possibility to route incoming requests to a multiple different network locations.</li> | ||
<li><b>-- custom --</b> - does not use any of the predefined route types.</li> | <li><b>-- custom --</b> - does not use any of the predefined route types.</li> | ||
</ul> | </ul> | ||
Line 194: | Line 189: | ||
</table> | </table> | ||
== | ==Advanced Static Routes== | ||
The <b> | The <b>Advanced Static Routes</b> section is used to configure policy-based routing infrastructures, which are usually used in more complex or specific networking scenarios. | ||
===Routing Tables=== | ===Routing Tables=== | ||
Line 212: | Line 207: | ||
Refer to the table below for information on configuration fields for routing tables. | Refer to the table below for information on configuration fields for routing tables. | ||
[[File: | [[File:Networking_rutos_manual_routing_advanced_static_routes_routing_tables_routing_table_settings.png|border|class=tlt-border]] | ||
<table class="nd-mantable"> | <table class="nd-mantable"> | ||
Line 219: | Line 214: | ||
<th>Value</th> | <th>Value</th> | ||
<th>Description</th> | <th>Description</th> | ||
</tr> | |||
<tr> | |||
<td>ID of Table</td> | |||
<td>integer [1..252]; default: <b>none</b></td> | |||
<td>Unique numerical identifier for the table. A table can be invoked by the both its ID or name.</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
Line 224: | Line 224: | ||
<td>string; default: <b>none</b></td> | <td>string; default: <b>none</b></td> | ||
<td>A custom name for the table. A table can be invoked by the both its ID or name.</td> | <td>A custom name for the table. A table can be invoked by the both its ID or name.</td> | ||
</tr> | </tr> | ||
</table> | </table> | ||
Line 329: | Line 324: | ||
Each protocol is described in the sections below. | Each protocol is described in the sections below. | ||
===BGP=== | ===BGP=== | ||
---- | ---- | ||
Line 340: | Line 331: | ||
====General Settings==== | ====General Settings==== | ||
---- | ---- | ||
Below is an example of BGP <b>General</b> settings section. | |||
[[File: | [[File:Networking_rutos_manual_routing_dynamic_routes_bgp_general_settings.png|border|class=tlt-border]] | ||
<table class="nd-mantable"> | <table class="nd-mantable"> | ||
Line 352: | Line 343: | ||
<tr> | <tr> | ||
<td>Enable</td> | <td>Enable</td> | ||
<td>off | <td>off <nowiki>|</nowiki> on; default: <b>off</b></td> | ||
<td> | <td>Toggles the BGP protocol on or off</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>Enable vty</td> | <td>Enable vty</td> | ||
<td>off | <td>off <nowiki>|</nowiki> on; default: <b>off</b></td> | ||
<td> | <td>Toggles vty access on or off</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>Import config</td> | <td>Import config</td> | ||
<td>- | <td>-</td> | ||
<td>Uploads an external BGP configuration | <td>Uploads an external BGP configuration</td> | ||
</tr> | </tr> | ||
</table> | </table> | ||
Line 369: | Line 360: | ||
====BGP Instance==== | ====BGP Instance==== | ||
---- | ---- | ||
Below is an example of '''BGP Instance''' settings section. | |||
[[File:Networking_rutos_manual_routing_dynamic_routes_bgp_bgp_instance.png|border|class=tlt-border]] | |||
[[File: | |||
<table class="nd-mantable"> | <table class="nd-mantable"> | ||
Line 386: | Line 372: | ||
<tr> | <tr> | ||
<td>Enable</td> | <td>Enable</td> | ||
<td>off | <td>off <nowiki>|</nowiki> on; default: <b>off</b></td> | ||
<td> | <td>Toggles the BGP instance on or off</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>AS</td> | <td>AS</td> | ||
<td> | <td>default: <b>none</b></td> | ||
<td>AS number is an identification of an autonomous system. BGP protocol uses the AS number for detecting whether the BGP connection is an internal one or external one. '''[Required]'''</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>BGP router ID</td> | <td>BGP router ID</td> | ||
<td> | <td>default: <b>none</b></td> | ||
<td>The router | <td>The router id is used by BGP to identify the routing device from which a packet originated. default router ID value is selected as the largest IP Address of the interface.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>Network</td> | <td>Network</td> | ||
<td> | <td>default: <b>none</b></td> | ||
<td> | <td>Add an announcement network(s)</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>Redistribution options</td> | <td>Redistribution options</td> | ||
<td> | <td>default: <b>none</b></td> | ||
<td> | <td>'''Route redistribution''' is a process that allows a network to use a '''routing''' protocol to dynamically '''route''' traffic based on information learned from a different '''routing''' protocol.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td> | <td>Deterministic</td> | ||
<td>off | <td>off <nowiki>|</nowiki> on; default: <b>off</b></td> | ||
<td> | <td>Compare MED between same AS ignoring their age</td> | ||
</tr> | </tr> | ||
</table> | </table> | ||
====BGP Peers==== | |||
---- | ---- | ||
<b>BGP Peers</b> | Below is an example of <b>BGP Peers</b> section. You can create a new peer by clicking the 'Add' button. | ||
[[File:Networking_rutos_manual_routing_dynamic_routes_bgp_bgp_peers.png|border|class=tlt-border]] | |||
[[File: | |||
<table class="nd-mantable"> | <table class="nd-mantable"> | ||
Line 448: | Line 416: | ||
<tr> | <tr> | ||
<td>Enable</td> | <td>Enable</td> | ||
<td>off | <td>off <nowiki>|</nowiki> on; default: <b>off</b></td> | ||
<td> | <td>Toggles the BGP peer on or off</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>Remote AS</td> | <td>Remote AS</td> | ||
<td> | <td>default: <b>none</b></td> | ||
<td> | <td>Neighbour's remote AS</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>Remote address</td> | <td>Remote address</td> | ||
<td> | <td>IP; default: <b>none</b></td> | ||
<td>IPv4 address | <td>Neighbour's remote IPv4 address</td> | ||
</tr> | </tr> | ||
</table> | |||
By pressing '''Edit''' button you can find more settings related to '''BGP Peer.''' | |||
[[File:Networking_rutos_manual_routing_dynamic_routes_bgp_bgp_peers_bgp_peer.png|border|class=tlt-border]] | |||
<table class="nd-mantable"> | |||
<tr> | <tr> | ||
<th>Field</th> | |||
<th>Value</th> | |||
<th>Description</th> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>Enable</td> | |||
<td>off <nowiki>|</nowiki> on; default: <b>off</b></td> | |||
<td>Toggles BGP Peer on or off</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>Remote AS</td> | |||
<td>default: <b>none</b></td> | |||
<td>Neighbour's remote AS</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td> | <td>Remote address</td> | ||
<td> | <td>IP; default: <b>none</b></td> | ||
<td> | <td>Neighbour's remote IPv4 address</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td> | <td>Remote port</td> | ||
<td> | <td>default: <b>none</b></td> | ||
<td> | <td>Neighbour's remote port</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td> | <td>EBGP Multihop</td> | ||
<td> | <td>default: <b>none</b></td> | ||
<td> | <td>Time to Live value</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td> | <td>default originate</td> | ||
<td>off | <td>off <nowiki>|</nowiki> on; default: <b>off</b></td> | ||
<td> | <td>Announce default routes to the peer</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>Description</td> | <td>Description</td> | ||
<td> | <td>default: <b>none</b></td> | ||
<td> | <td>You can leave notes here</td> | ||
</tr> | </tr> | ||
</table> | </table> | ||
====BGP Peer Groups==== | |||
---- | ---- | ||
Below is an example of '''BGP Peer Groups''' section. You can create a new group by writing a name and pressing '''Add''' button. | |||
[[File: | [[File:Networking_rutos_manual_routing_dynamic_routes_bgp_bgp_peer_groups.png|border|class=tlt-border]] | ||
<table class="nd-mantable"> | |||
<tr> | |||
<th>Field</th> | |||
<th>Value</th> | |||
<th>Description</th> | |||
</tr> | |||
<tr> | |||
<td>Remote AS</td> | |||
<td>default: <b>none</b></td> | |||
<td>Neighbour's remote AS</td> | |||
</tr></table> | |||
By pressing 'Edit' button you can find more settings related to '''BGP Peer Groups.''' | |||
[[File:Networking_rutos_manual_routing_dynamic_routes_bgp_bgp_peer_groups_bgp_peer_group.png|border|class=tlt-border]] | |||
[[File: | |||
<table class="nd-mantable"> | <table class="nd-mantable"> | ||
Line 530: | Line 508: | ||
<tr> | <tr> | ||
<td>Enable</td> | <td>Enable</td> | ||
<td>off | <td>off <nowiki>|</nowiki> on; default: <b>off</b></td> | ||
<td> | <td>Toggles the BGP Peer-Group on or off</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>Remote AS</td> | <td>Remote AS</td> | ||
<td> | <td>default: <b>none</b></td> | ||
<td>Neighbour's remote AS | <td>Neighbour's remote AS</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>Neighbor address</td> | <td>Neighbor address</td> | ||
<td> | <td>IP; default: <b>none</b></td> | ||
<td>Neighbour's remote IPv4 address | <td>Neighbour's remote IPv4 address</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>Advertisement interval</td> | <td>Advertisement interval</td> | ||
<td> | <td>default: <b>none</b></td> | ||
<td>Delay between updates for a neighbor session | <td>Delay between updates for a neighbor session</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>Neighbor configuration</td> | <td>Neighbor configuration</td> | ||
<td> | <td>default: '''None'''</td> | ||
<td> | <td>Configure a neighbor as Route Reflector or Route Server client.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>Disable next hop calculation</td> | <td>Disable next hop calculation</td> | ||
<td>off | <td>off <nowiki>|</nowiki> on; default: <b>off</b></td> | ||
<td> | <td>Disable the next hop calculation for this group</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>Inbound soft-reconfiguration</td> | <td>Inbound soft-reconfiguration</td> | ||
<td>off | <td>off <nowiki>|</nowiki> on; default: <b>off</b></td> | ||
<td> | <td>Allow inbound soft reconfiguration for this neighbor</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>Disable connected check</td> | <td>Disable connected check</td> | ||
<td>off | <td>off <nowiki>|</nowiki> on; default: <b>off</b></td> | ||
<td> | <td>One-hop away EBGP peer using loopback address</td> | ||
</tr> | </tr> | ||
</table> | </table> | ||
==== | ====Access List Filters==== | ||
---- | ---- | ||
Below is an example of '''Access List Filters''' section. | |||
[[File: | [[File:Networking_rutos_manual_routing_dynamic_routes_bgp_access_list_filters.png|border|class=tlt-border]] | ||
You can add a new list by simply pressing '''Add''' button. | |||
[[File: | [[File:Networking_rutos_manual_routing_dynamic_routes_bgp_access_list_filters_configuration.png|border|class=tlt-border]] | ||
<table class="nd-mantable"> | <table class="nd-mantable"> | ||
Line 600: | Line 563: | ||
<th>Value</th> | <th>Value</th> | ||
<th>Description</th> | <th>Description</th> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>Enable</td> | <td>Enable</td> | ||
<td>off | <td>off <nowiki>|</nowiki> on; default: <b>off</b></td> | ||
<td> | <td>Toggles the Access filter on or off</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>Peer</td> | <td>Peer</td> | ||
<td>bgp peer; default: | <td>bgp peer; default: '''first peer on list'''</td> | ||
<td>Applies the | <td>Applies the rule for the specified peer.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>Action</td> | <td>Action</td> | ||
<td> | <td>default: '''Permit'''</td> | ||
<td> | <td>Denies or permits matched entry.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td> | <td>Network</td> | ||
<td> | <td>default: '''Any'''</td> | ||
<td>Applies filter rule for this source network.</td> | <td>Applies filter rule for this source network.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>Direction</td> | <td>Direction</td> | ||
<td> | <td>default: '''Inbound'''</td> | ||
<td>If direction is Inbound, the access list is applied to input routes. If direction is Outbound the access list is applied to advertised routes | <td>If direction is '''Inbound''', the access list is applied to input routes. If direction is '''Outbound''' the access list is applied to advertised routes.</td> | ||
</tr> | </tr> | ||
</table> | </table> | ||
===RIP=== | ===RIP Protocol=== | ||
---- | ---- | ||
The <b>Routing Information Protocol (RIP)</b> is one of the oldest distance-vector routing protocols which employ the hop count as a routing metric. RIP prevents routing loops by implementing a limit on the number of hops allowed in a path from source to destination. The maximum number of hops allowed for RIP is 15, which limits the size of networks that RIP can support. A hop count of 16 is considered an infinite distance and the route is considered unreachable. RIP implements the split horizon, route poisoning and holddown mechanisms to prevent incorrect routing information from being propagated. | The <b>Routing Information Protocol (RIP)</b> is one of the oldest distance-vector routing protocols which employ the hop count as a routing metric. RIP prevents routing loops by implementing a limit on the number of hops allowed in a path from source to destination. The maximum number of hops allowed for RIP is 15, which limits the size of networks that RIP can support. A hop count of 16 is considered an infinite distance and the route is considered unreachable. RIP implements the split horizon, route poisoning and holddown mechanisms to prevent incorrect routing information from being propagated. | ||
Line 714: | Line 597: | ||
====General Settings==== | ====General Settings==== | ||
---- | ---- | ||
Below is an example of RIP '''General''' settings section. | |||
[[File: | [[File:Networking_rutos_manual_routing_dynamic_routes_rip_general_settings.png|border|class=tlt-border]] | ||
<table class="nd-mantable"> | <table class="nd-mantable"> | ||
Line 726: | Line 609: | ||
<tr> | <tr> | ||
<td>Enable</td> | <td>Enable</td> | ||
<td>off | <td>off <nowiki>|</nowiki> on; default: <b>off</b></td> | ||
<td> | <td>Toggles RIP Protocol on or off</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>Enable vty</td> | <td>Enable vty</td> | ||
<td>off | <td>off <nowiki>|</nowiki> on; default: <b>off</b></td> | ||
<td> | <td>Toggles vty access on or off</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>Import config</td> | <td>Import config</td> | ||
<td>- | <td>-</td> | ||
<td> | <td>Uses imported RIP configurations.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>Version</td> | <td>Version</td> | ||
<td> | <td>default: '''2'''</td> | ||
<td>Specifies the | <td>Specifies the version of RIP.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>Neighbor</td> | <td>Neighbor</td> | ||
<td> | <td>default: <b>none</b></td> | ||
<td> | <td>Neighbour IP addres</td> | ||
</tr> | </tr> | ||
</table> | </table> | ||
Line 753: | Line 636: | ||
====RIP Interfaces==== | ====RIP Interfaces==== | ||
---- | ---- | ||
Below is an example of '''RIP Interfaces''' settings section. | |||
[[File:Networking_rutos_manual_routing_dynamic_routes_rip_rip_interfaces.png|border|class=tlt-border]] | [[File:Networking_rutos_manual_routing_dynamic_routes_rip_rip_interfaces.png|border|class=tlt-border]] | ||
[[File:Networking_rutos_manual_routing_dynamic_routes_rip_rip_interfaces_configuration.png|border|class=tlt-border]] | |||
[[File: | |||
<table class="nd-mantable"> | <table class="nd-mantable"> | ||
Line 770: | Line 647: | ||
<th>Value</th> | <th>Value</th> | ||
<th>Description</th> | <th>Description</th> | ||
</tr> | |||
<tr> | |||
<td>Enable</td> | |||
<td>off <nowiki>|</nowiki> on; default: <b>off</b></td> | |||
<td>Toggles RIP Interface on or off</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>Interface</td> | <td>Interface</td> | ||
<td>network | <td>network interfaces; default: '''loopback'''</td> | ||
<td>Network interface | <td>Network interface to be used with the RIP interface</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>Passive interface</td> | <td>Passive interface</td> | ||
<td>off | <td>off <nowiki>|</nowiki> on; default: <b>off</b></td> | ||
<td>Sets the specified interface to passive mode. On passive mode interface, all receiving packets are processed as normal and | <td>Sets the specified interface to passive mode. On passive mode interface, all receiving packets are processed as normal and ripd does not send either multicast or unicast RIP packets | ||
</td> | |||
</tr> | </tr> | ||
</table> | </table> | ||
Line 795: | Line 668: | ||
====Access list filters==== | ====Access list filters==== | ||
---- | ---- | ||
Below is an example of '''Access list filters''' settings section. | |||
[[File:Networking_rutos_manual_routing_dynamic_routes_rip_access_list_filters.png|border|class=tlt-border]] | [[File:Networking_rutos_manual_routing_dynamic_routes_rip_access_list_filters.png|border|class=tlt-border]] | ||
[[File:Networking_rutos_manual_routing_dynamic_routes_rip_access_list_filters_configuration.png|border|class=tlt-border]] | |||
[[File: | |||
<table class="nd-mantable"> | <table class="nd-mantable"> | ||
Line 812: | Line 679: | ||
<th>Value</th> | <th>Value</th> | ||
<th>Description</th> | <th>Description</th> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>Enable</td> | <td>Enable</td> | ||
<td>off | <td>off <nowiki>|</nowiki> on; default: <b>off</b></td> | ||
<td> | <td>Toggles the Access filter on or off</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>RIP interface</td> | <td>RIP interface</td> | ||
<td> | <td>RIP interface; default: '''first interface on list'''</td> | ||
<td> | <td>Applies the rule for the specified interface</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>Action</td> | <td>Action</td> | ||
<td> | <td>default: '''Permit'''</td> | ||
<td> | <td>Denies or permits matched entry</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>Network</td> | <td>Network</td> | ||
<td> | <td>default: '''Any'''</td> | ||
<td> | <td>Applies filter rule for this source network.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>Direction</td> | <td>Direction</td> | ||
<td> | <td>default: '''Inbound'''</td> | ||
<td> | <td>If direction is '''Inbound''', the access list is applied to input routes. If direction is '''Outbound''' the access list is applied to advertised routes.</td> | ||
</tr> | </tr> | ||
</table> | </table> | ||
===OSPF=== | ===OSPF Protocol=== | ||
---- | ---- | ||
'''Open Shortest Path First (OSPF)''' is a routing protocol for Internet Protocol (IP) networks. It uses a link state routing (LSR) algorithm and falls into the group of interior gateway protocols (IGPs), operating within a single autonomous system (AS). It is defined as OSPF Version 2 in RFC 2328 for IPv4. | |||
====General Settings==== | ====General Settings==== | ||
---- | ---- | ||
Below is an example of OSPF '''General''' settings section. | |||
[[File: | [[File:Networking_rutos_manual_routing_dynamic_routes_ospf_protocol_general_settings.png|border|class=tlt-border]] | ||
<table class="nd-mantable"> | <table class="nd-mantable"> | ||
Line 863: | Line 725: | ||
<tr> | <tr> | ||
<td>Enable</td> | <td>Enable</td> | ||
<td>off | <td>off <nowiki>|</nowiki> on; default: <b>off</b></td> | ||
<td> | <td>Toggles OSPF Protocol on or off</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>Enable vty</td> | <td>Enable vty</td> | ||
<td>off | <td>off <nowiki>|</nowiki> on; default: <b>off</b></td> | ||
<td> | <td>Toggles vty access on or off</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>Import</td> | <td>Import</td> | ||
<td>- | <td>-</td> | ||
<td> | <td>Uses imported OSPF configurations</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>Router ID</td> | <td>Router ID</td> | ||
<td> | <td>default: <b>none</b></td> | ||
<td>Sets the router-ID | <td>Sets the router-ID of the OSPF process. The router-ID may be an IP address of the router, but need not be - it can be any arbitrary 32bit number</td> | ||
</tr> | </tr> | ||
</table> | </table> | ||
Line 906: | Line 747: | ||
====OSPF Interface==== | ====OSPF Interface==== | ||
---- | ---- | ||
Below is an example of '''OSPF Interface''' settings section. | |||
[[File: | [[File:Networking_rutos_manual_routing_dynamic_routes_ospf_protocol_ospf_interface.png|border|class=tlt-border]] | ||
OSPF Interface | By pressing the '''Edit''' button you can find more settings related to '''OSPF Interface'''. | ||
[[File:Networking_rutos_manual_routing_dynamic_routes_ospf_protocol_ospf_interface_begin_to_edit.png|border|class=tlt-border]] | [[File:Networking_rutos_manual_routing_dynamic_routes_ospf_protocol_ospf_interface_begin_to_edit.png|border|class=tlt-border]] | ||
You should directed to a window such as this: | You should directed to a window such as this: | ||
[[File: | [[File:Networking_rutos_manual_routing_dynamic_routes_ospf_protocol_ospf_interface_configuration.png|border|class=tlt-border]] | ||
<table class="nd-mantable"> | <table class="nd-mantable"> | ||
Line 948: | Line 767: | ||
<tr> | <tr> | ||
<td>Enable</td> | <td>Enable</td> | ||
<td>off | <td>off <nowiki>|</nowiki> on; default: <b>off</b></td> | ||
<td> | <td>Toggles OSPF area on or off</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>Cost</td> | <td>Cost</td> | ||
<td> | <td>default: <b>none</b></td> | ||
<td>The cost value is set to router-LSA’s metric field and used for SPF calculation | <td>The cost value is set to router-LSA’s metric field and used for SPF calculation</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>Hello Interval</td> | <td>Hello Interval</td> | ||
<td> | <td>default: '''10'''</td> | ||
<td> | <td>This value controls how frequently (every n seconds) a 'Hello' packet is sent out on the specified interface</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>Router Dead Interval</td> | <td>Router Dead Interval</td> | ||
<td> | <td>default: '''40'''</td> | ||
<td>This value must be the same for all routers attached to a common | <td>This value must be the same for all routers attached to a common network</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>Retransmit</td> | <td>Retransmit</td> | ||
<td> | <td>default: '''5'''</td> | ||
<td> | <td>This value is used when re-transmitting Database Description and Link State Request packets</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>Priority</td> | <td>Priority</td> | ||
<td> | <td>default: '''1'''</td> | ||
<td> | <td>The router with the highest priority will be more eligible to become Designated Router. Setting the value to 0, makes the router ineligible to become Designated Router</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>Type</td> | <td>Type</td> | ||
<td> | <td>default: <b>none</b></td> | ||
<td>OSPF interface configuration type.</td> | <td>OSPF interface configuration type.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>Authentication</td> | <td>Authentication</td> | ||
<td> | <td>default: '''None'''</td> | ||
<td> | <td>Authentication method.</td> | ||
</tr> | </tr> | ||
</table> | </table> | ||
Line 1,024: | Line 809: | ||
====OSPF Area==== | ====OSPF Area==== | ||
---- | ---- | ||
Below is an example of '''OSPF Area''' settings section. | |||
[[File:Networking_rutos_manual_routing_dynamic_routes_ospf_protocol_ospf_area.png|border|class=tlt-border]] | [[File:Networking_rutos_manual_routing_dynamic_routes_ospf_protocol_ospf_area.png|border|class=tlt-border]] | ||
To add a new OSPF | To add a new OSPF area, look to the 'Add New Area' section. Enter a custom name and click the 'Add' button. Your new area will appear in the 'OSPF Area' list. | ||
[[File:Networking_rutos_manual_routing_dynamic_routes_ospf_protocol_ospf_area_configuration.png|border|class=tlt-border]] | |||
[[File: | |||
<table class="nd-mantable"> | <table class="nd-mantable"> | ||
Line 1,043: | Line 824: | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td> | <td>Enable</td> | ||
<td> | <td>off <nowiki>|</nowiki> on; default: <b>off</b></td> | ||
<td> | <td>Toggles OSPF area on or off</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td> | <td>Cost</td> | ||
<td> | <td>IP;default: <b>none</b></td> | ||
<td>OSPF | <td>Specifies OSPF area</td> | ||
</tr> | </tr> | ||
</table> | </table> | ||
Line 1,066: | Line 837: | ||
====OSPF Networks==== | ====OSPF Networks==== | ||
---- | ---- | ||
Below is an example of '''OSPF Networks''' settings section. | |||
Below is an example of | |||
[[File:Networking_rutos_manual_routing_dynamic_routes_ospf_protocol_ospf_networks.png|border|class=tlt-border]] | [[File:Networking_rutos_manual_routing_dynamic_routes_ospf_protocol_ospf_networks.png|border|class=tlt-border]] | ||
To add a new OSPF | To add a new OSPF network, look to the 'Add New Network' section. Enter a custom name and click the 'Add' button. Your new network will appear in the 'OSPF Networks' list. | ||
Your new network will appear in the OSPF Networks list | |||
[[File:Networking_rutos_manual_routing_dynamic_routes_ospf_protocol_ospf_networks_configuration.png|border|class=tlt-border]] | [[File:Networking_rutos_manual_routing_dynamic_routes_ospf_protocol_ospf_networks_configuration.png|border|class=tlt-border]] | ||
Line 1,087: | Line 852: | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td> | <td>Enable</td> | ||
<td> | <td>off <nowiki>|</nowiki> on; default: <b>off</b></td> | ||
<td> | <td>Toggles OSPF network on or off</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>Network</td> | <td>Network</td> | ||
<td> | <td>[a.b.c.d/m]; default: <b>none</b></td> | ||
<td> | <td>This command specifies the OSPF enabled interface. If the interface has an address from the range '''a.b.c.d/m''' then enables OSPF on this interface so the router can provide network information to the other OSPF routers via this interface</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>Area</td> | <td>Area</td> | ||
<td>OSPF area; default: <b>none</b></td> | <td>OSPF area; default: <b>none</b></td> | ||
<td> | <td>Specifies OSPF area</td> | ||
</tr> | </tr> | ||
</table> | </table> | ||
Line 1,114: | Line 874: | ||
====General==== | ====General==== | ||
---- | ---- | ||
Below is an example of EIGRP '''General''' settings section. | |||
[[File: | [[File:Networking_rutos_manual_routing_dynamic_routes_eigrp_general_settings.png|border|class=tlt-border]] | ||
<table class="nd-mantable"> | <table class="nd-mantable"> | ||
Line 1,126: | Line 886: | ||
<tr> | <tr> | ||
<td>Enable</td> | <td>Enable</td> | ||
<td>off | <td>off <nowiki>|</nowiki> on; default: <b>off</b></td> | ||
<td> | <td>Toggles EIGRP network on or off</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>Enable logging</td> | <td>Enable logging</td> | ||
<td>off | <td>off <nowiki>|</nowiki> on; default: <b>off</b></td> | ||
<td> | <td>Enable logging of EIGRP</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>AS</td> | <td>AS</td> | ||
<td> | <td>default: <b>none</b></td> | ||
<td>EIGRP | <td>'''EIGRP''' uses this number so that it makes sure it only talks to other EIGRP speakers that are in the same AS. For instance, if you have two routers, one with "router eigrp 1" and one with "router eigrp 2," then they would not form an adjacency</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>Router ID</td> | <td>Router ID</td> | ||
<td> | <td>IP; default: <b>none</b></td> | ||
<td> | <td>'''EIGRP''' router-ID in IP address format</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>Network</td> | <td>Network</td> | ||
<td>IP; default: <b>none</b></td> | |||
<td>The announcement network</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>Redistribution options</td> | <td>Redistribution options</td> | ||
<td> | <td>default: <b>none</b></td> | ||
<td> | <td>'''Route redistribution''' is a process that allows a network to use a '''routing''' protocol to dynamically '''route''' traffic based on information learned from a different '''routing''' protocol.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>Neighbors</td> | <td>Neighbors</td> | ||
<td> | <td>IP; default: <b>none</b></td> | ||
<td> | <td>Neighbour IP addres</td> | ||
</tr> | </tr> | ||
</table> | </table> | ||
===NHRP=== | ===NHRP Protocol=== | ||
---- | ---- | ||
Next Hop Resolution Protocol (NHRP) is a protocol or method that can be used so that a computer sending data to another computer can learn the most direct route (the fewest number of hops) to the receiving computer. | |||
====General Settings==== | ====General Settings==== | ||
---- | ---- | ||
Below is an example of NHRP '''General''' settings section. | |||
[[File: | [[File:Networking_rutos_manual_routing_dynamic_routes_nhrp_general_settings.png|border|class=tlt-border]] | ||
<table class="nd-mantable"> | <table class="nd-mantable"> | ||
Line 1,179: | Line 939: | ||
<tr> | <tr> | ||
<td>Enable service</td> | <td>Enable service</td> | ||
<td>off | <td>off <nowiki>|</nowiki> on; default: <b>off</b></td> | ||
<td> | <td>Toggles NHRP network on or off</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>Enable logging</td> | <td>Enable logging</td> | ||
<td>off | <td>off <nowiki>|</nowiki> on; default: <b>off</b></td> | ||
<td> | <td>Toggles NHRP logging on or off</td> | ||
</tr></table> | </tr></table> | ||
====Interfaces==== | ====Interfaces==== | ||
---- | ---- | ||
Below is an example of NHRP <b>Interfaces</b> settings section. By default, it is empty. | |||
[[File: | [[File:Networking_rutos_manual_routing_dynamic_routes_nhrp_interfaces.png|border|class=tlt-border]] | ||
To | To add a new NHRP interface, look to the 'Add New Interface' section. Enter a custom name and click the 'Add' button. Your new interface will appear in the 'Interfaces' list. | ||
[[File: | [[File:Networking_rutos_manual_routing_dynamic_routes_nhrp_interfaces_begin_to_edit.png|border|class=tlt-border]] | ||
<table class="nd-mantable"> | |||
<tr> | |||
<th>Field</th> | |||
<th>Value</th> | |||
<th>Description</th> | |||
</tr> | |||
<tr> | |||
<td>Enable</td> | |||
<td>off <nowiki>|</nowiki> on; default: <b>off</b></td> | |||
<td>Toggles interface on or off</td> | |||
</tr> | |||
</table> | |||
=====NHRP Interface Configuration===== | |||
---- | |||
By pressing the '''Edit''' button you can find more settings related to '''NHRP Interface.''' | |||
[[File:Networking_rutos_manual_routing_dynamic_routes_nhrp_interfaces_interface_configuration.png|border|class=tlt-border]] | |||
[[File: | |||
<table class="nd-mantable"> | <table class="nd-mantable"> | ||
Line 1,214: | Line 985: | ||
<tr> | <tr> | ||
<td>Enabled</td> | <td>Enabled</td> | ||
<td>off | <td>off <nowiki>|</nowiki> on; default: <b>off</b> | ||
</td><td>Enables DMVPN client</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>Interface</td> | <td>Interface</td> | ||
<td> | <td>default: <b>br-lan</b></td> | ||
<td> | <td>Interface which will be using NHRP</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>Network ID</td> | <td>Network ID</td> | ||
<td> | <td>default: <b>none</b></td> | ||
<td> | <td>Network ID of NHRP</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>NHS</td> | <td>NHS</td> | ||
<td> | <td>Dynamic <nowiki>|</nowiki> custom; default: <b>none</b></td> | ||
<td>IP address of | <td>IP address of Next-Hop Server.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>NBMA</td> | <td>NBMA</td> | ||
<td> | <td>default: <b>none</b></td> | ||
<td>Non-Broadcast Multi-Access (NBMA) network IP address | <td>Non-Broadcast Multi-Access(NBMA) network IP address</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>Hold-time</td> | <td>Hold-time</td> | ||
<td> | <td>default: '''7200'''</td> | ||
<td>Specifies the holding time | <td>Specifies the holding time for NHRP Registration Requests and Resolution Replies sent from this interface or shortcut-target. The holdtime is specified in seconds and defaults to two hours.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>IPsec support</td> | <td>IPsec support</td> | ||
<td>off | <td>off <nowiki>|</nowiki> on; default: <b>off</b></td> | ||
<td> | <td>Use NHRP over IPsec</td> | ||
</tr> | |||
<tr> | |||
<td>IP address</td> | |||
<td>IP; default: <b>none</b></td> | |||
<td>Network ID of NHRP</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td> | <td>NBMA</td> | ||
<td> | <td>IP; default: <b>none</b></td> | ||
<td> | <td>IP address of Next-Hop Server</td> | ||
</tr> | </tr> | ||
</table> | </table> | ||
Line 1,261: | Line 1,032: | ||
=====NHRP Mappings Configuration===== | =====NHRP Mappings Configuration===== | ||
---- | ---- | ||
Below is an example of the <b>NHRP Mappings Configuration</b> section. | |||
[[File: | [[File:Networking_rutos_manual_routing_dynamic_routes_nhrp_interfaces_nhrp_mappings_configuration.png|border|class=tlt-border]] | ||
To add a new configuration click the 'Add' button and it will appear in the 'NHRP Mappings Configuration' list. | |||
[[File: | [[File:Networking_rutos_manual_routing_dynamic_routes_nhrp_interfaces_nhrp_mappings_configuration_edit.png|border|class=tlt-border]] | ||
<table class="nd-mantable"> | <table class="nd-mantable"> | ||
Line 1,274: | Line 1,045: | ||
<th>Value</th> | <th>Value</th> | ||
<th>Description</th> | <th>Description</th> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>Enabled</td> | <td>Enabled</td> | ||
<td>off | <td>off <nowiki>|</nowiki> on; default: <b>off</b></td> | ||
<td>Turns this mapping configuration on or off.</td> | <td>Turns this mapping configuration on or off.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td> | <td>IP Address</td> | ||
<td> | <td>ip; default: <b>none</b></td> | ||
<td> | <td>Network ID of another NHRP.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>NBMA</td> | <td>NBMA</td> | ||
<td> | <td>ip; default: <b>none</b></td> | ||
<td> | <td>IP address of next-hop server.</td> | ||
</tr> | </tr> | ||
</table>|}} | </table>|}} | ||
[[Category:{{{name}}} Network section]] | [[Category:{{{name}}} Network section]] |
Revision as of 14:44, 20 August 2020
Template:Networking rutos manual fw disclosure
Summary
The Routing page is used to set up static routes, routing tables and rules.
This manual page provides an overview of the Routing windows in {{{name}}} devices.
If you're having trouble finding this page or some of the parameters described here on your device's WebUI, you should turn on "Advanced WebUI" mode. You can do that by clicking the "Advanced" button, located at the top of the WebUI.
Static Routes
Routes ensure that network traffic finds its path to a specified host or network, both in local and remote network scenarios. Static routes are simply fixed routing entries in the routing table(s).
This section provides the possibility to configure custom static routes.
Static IPv4 Routes
The Static IPv4 Routes section displays a list of user defined static IPv4 routes and provides the possibility to add and configure new ones. The list is empty by default.
To add a new route and begin editing, simply click the 'Add' button. Refer to the table below for information on static route configuration fields.
Field | Value | Description |
---|---|---|
Interface | network interface; default: lan | The zone where the target network resides |
Target* | ip4; default: none | The address of a destination network. |
IPv4-Netmask* | netmask; default: none | A netmask is used to divide an IP address into sub-networks (subnets). Combined together, the 'Netmask' and 'Target' values define the exact destination network or IP address to which this route applies. |
IPv4-Gateway | ip4; default: none | A gateway can be any machine in a network that is capable of serving as an access point to another network. Traffic that matches this route will be directed over the IP address specified in this field. |
Metric | integer [0..255]; default: none | The metric value acts as a measurement of priority. If a packet about to be routed matches two or more rules, the one with the lower metric is applied. |
MTU | integer [64..9000]; default: 1500 | Sets the maximum transmission unit (MTU) size. It is the largest size of a protocol data unit (PDU) that can be transmitted in a single network layer transaction. |
Route Type | unicast | local | broadcast | multicast | unreachable | prohibit | backhole | anycast | -- custom -- ; default: unicast | Selects route type. Each type specifies a different behavior for the route:
|
*Additional notes on 'Target' & 'Netmask' fields:
You can define a rule that applies to a single IP like this:
- Target: some IP
- Netmask: 255.255.255.255
Furthermore, you can create target/netmask combinations that apply to a range of IPs. Refer to the table below for examples.
Target | Netmask | Network range |
---|---|---|
192.168.2.0 | 255.255.255.240 | 192.168.2.0 - 192.168.2.15 |
192.168.2.240 | 255.255.255.240 | 192.168.2.240 - 192.168.2.255 |
192.168.2.161 | 255.255.255.0 | 192.168.2.0 - 192.168.55.255 |
192.168.0.0 | 255.255.0.0 | 192.168.0.0 - 192.168.255.255 |
192.168.2.161 | 255.255.255.255 | 192.168.2.161 |
Static IPv6 Routes
The Static IPv6 Routes section displays a list of user defined static IPv6 routes and provides the possibility to add and configure new ones. The list is empty by default.
To add a new route and begin editing, simply click the 'Add' button. Refer to the table below for information on static route configuration fields.
Field | Value | Description |
---|---|---|
Interface | network interface; default: lan | The zone where the target network resides |
Target | ip6; default: none | The address of a destination network. |
IPv6-Gateway | ip6; default: none | A gateway can be any machine in a network that is capable of serving as an access point to another network. Traffic that matches this route will be directed over the IP address specified in this field. |
Metric | integer [0..255]; default: none | The metric value acts as a measurement of priority. If a packet about to be routed matches two or more rules, the one with the lower metric is applied. |
MTU | integer [64..9000]; default: 1500 | Sets the maximum transmission unit (MTU) size. It is the largest size of a protocol data unit (PDU) that can be transmitted in a single network layer transaction. |
Route Type | unicast | local | broadcast | multicast | unreachable | prohibit | backhole | anycast | -- custom -- ; default: unicast | Selects route type. Each type specifies a different behavior for the route:
|
Advanced Static Routes
The Advanced Static Routes section is used to configure policy-based routing infrastructures, which are usually used in more complex or specific networking scenarios.
Routing Tables
Routing Tables store network routes. Tables are checked before every routing decision until a matching route is found. Having multiple tables allows the user to set up a policy routing infrastructure. Policy-based routing is a technique where routing decisions are based on policies (rule) set by the user.
The 'Routing Tables' section displays user created routing tables. By default, the list is empty.
To create a new table, look to the 'Add New Routing Table' section below. Enter an ID for the new table in the range of [1..252], enter a custom name and click the 'Add' button. The new table should appear in the 'Routing Tables' list. Click the 'Edit' button next to it to begin editing.
Refer to the table below for information on configuration fields for routing tables.
Field | Value | Description |
---|---|---|
ID of Table | integer [1..252]; default: none | Unique numerical identifier for the table. A table can be invoked by the both its ID or name. |
Name of Table | string; default: none | A custom name for the table. A table can be invoked by the both its ID or name. |
Routing Rules For IPv4
Routing Rules provide a way to route certain packets with exceptions, i.e., in accordance to a rule. 'Routing Rules For IPv4' displays user defined routing rules. It is empty by default. To create a new rule, click the 'Add' button and begin editing by clicking the 'Edit' button located to the right of the newly created rule.
Refer to table below for information on each configuration field.
Field | Value | Description |
---|---|---|
Priority | integer [0..65535]; default: none | Controls the order of IP rules. Rules with a lower priority value will be checked first. |
Incoming interface | network interface | Any; default: Any | Logical interface name for incoming traffic. Select 'Any' to make the rule apply to all network interfaces. |
Outgoing interface | network interface | None; default: None | Logical interface name for incoming traffic. Select 'None' to ignore outgoing interface. |
Source subnet | netmask; default: none | Source subnet to match the rule. |
Destination subnet | netmask; default: none | Destination subnet to match the rule. |
TOS Value to Match | integer [0..255]; default: none | The type of service (ToS) value to match in IP headers. |
Firewall Mark | integer [0..255] | hex [0x00..0xFF]; default: none | Specifies the fwmark and optionally its mask to match. For example, 0xFF to match mark 255 or 0x0/0x1 to match any even mark value. |
Invert matches | off | on; default: off | If enabled, the meaning of the match options (Firewall Mark, TOS Value, Source and Destination subnets) is inverted. |
Matched Traffic Action | Lookup Table | Jump to rule | Routing Action; default: Lookup Table | When network traffic matches this rule, the device will take an action specified in this field:
|
Lookup Table | routing table; default: none | Specifies a table for routing traffic that matches this rule. This field is visible only when 'Matched Traffic Action' is set to Lookup Table. |
Jump to rule | rule priority number; default: none | Specifies a another rule to follow for traffic that matches this rule. This field is visible only when 'Matched Traffic Action' is set to Jump to rule. |
Routing Action | Prohibit | Unreachable | Blackhole | Throw; default: Prohibit | When traffic matches this rule, the action specified in this field will be executed. This field is visible only when 'Matched Traffic Action' is set to Routing Action. |
[[Category:{{{name}}} Network section]]