Support Support Downloads Knowledge Base Service Request Manager My Juniper Community

Knowledge Base

Search our Knowledge Base sites to find answers to your questions.

Ask All Knowledge Base Sites All Knowledge Base Sites JunosE Defect (KA)Knowledge BaseSecurity AdvisoriesTechnical BulletinsTechnotes Sign in to display secure content and recently viewed articles

RIP updates not being received by the NetScreen

0

0

Article ID: KB7756 KB Last Updated: 25 Aug 2010Version: 3.0
Summary:
RIP updates being received by the Cisco router, but RIP updates are not being received by the NetScreen
Symptoms:
Event log messages state "RIP Neighbor Down"
Solution:

You will see the log message "rip: neighbor 1.1.1.1 down" if you don't have the appropriate network being advertised through RIP.  In one particular case, the router only had the connected route included in the router statement:

router rip
network 1.1.1.0

 

 However, in this scenario, the router on 1.1.1.1 was directly connected to 1.1.1.254.  Make sure you have the network you want advertised via RIP included in the network statement on the Cisco router.

Example:

router rip
network 1.1.1.0
network 11.11.11.0

In this example, 11.11.11.0/24 will be propagated into the NetScreen.  The relevant route table on the NetScreen would look like this:

NS25-> get route


Dest-Routes for <untrust-vr> (0 entries)
--------------------------------------------------------------------------------
H: Host C: Connected S: Static A: Auto-Exported I: Imported R: RIP P: Permanent
iB: IBGP eB: EBGP O: OSPF E1: OSPF external type 1
E2: OSPF external type 2


Dest-Routes for <trust-vr> (10 entries)
--------------------------------------------------------------------------------
   ID          IP-Prefix      Interface         Gateway   P Pref    Mtr     Vsys
--------------------------------------------------------------------------------
*   2    172.17.254.2/32           eth1         0.0.0.0   H    0      0     Root
*   3      172.30.1.0/24           eth2         0.0.0.0   C    0      0     Root
*   6       1.1.1.254/32           eth3         0.0.0.0   H    0      0     Root
*   5         1.1.1.0/24           eth3         0.0.0.0   C    0      0     Root
*   4      172.30.1.1/32           eth2         0.0.0.0   H    0      0     Root
*   1      172.17.0.0/16           eth1         0.0.0.0   C    0      0     Root
*  13        11.1.1.0/24           eth3         1.1.1.1   R  100      2     Root

 

Comment on this article > Affected Products Browse the Knowledge Base for more articles related to these product categories. Select a category to begin.

Security Alerts and Vulnerabilities

Security Alerts and Vulnerabilities Product Alerts and Software Release Notices Problem Report (PR) Search Tool EOL Notices and Bulletins JTAC User Guide Customer Care User Guide Pathfinder SRX High Availability Configurator SRX VPN Configurator Training Courses and Videos End User Licence Agreement Global Search