OpenBCM V1.07b12 (Linux)

Packet Radio Mailbox

DB0FHN

[JN59NK Nuernberg]

 Login: GUEST





  
VK2RQ  > TCPIP    11.08.13 13:03l 16 Lines 673 Bytes #999 (0) @ WW
BID : 14966_VK2RQ
Read: GUEST DG8NGN
Subj: RIPv2 updates from 44.131.160.1
Path: DB0FHN<DB0MAK<DB0ERF<IZ3LSV<I0OJJ<VE3UIL<VK2DOT<VK2RQ
Sent: 130811/1046Z @:VK2RQ.#SYD.NSW.AUS.OC #:14966 [Sydney] $:14966_VK2RQ
From: VK2RQ@VK2RQ.#SYD.NSW.AUS.OC
To  : TCPIP@WW

I started receiving on my ampenet gateway RIPv2 updates from 44.131.160.1.
Unlike the 44.0.0.1 updates, they do not contain any password. My rip44d
process is rejecting them, since they are not coming from 44.0.0.1.

Does anyone understand why 44.131.160.1 has started sending out these RIPv2
advertisements? Is it due to a misconfigured router, or is the intention
that this should act as a backup source of route advertisements? If the
latter, then it should probably be including a password the same as
44.0.0.1, and the rip44d script will need to be updated to accept updates
from that source address.

73, Matt VK2RQ


Read previous mail | Read next mail


 11.09.2025 15:53:07lGo back Go up