3) 4) in normal conditions you see split horizon with poison reverse in action when
an healthy network is announced back with metric 16 so if a network fails convergence is faster.
if RB reiceves network A from RA it will alwasys send out network A in its updates to RA with metric 16.
You can verify this using the appropriate debug ip rip command.
5) it is the opposite see above: it is the downstream router (the more far router from network) to advertise a poisoned route so that the upstream router cannot take in consideration its neighbor as a potential path to a failed route.
without poison reverse a process called count to infinity can take place if three or more routers are involved.
poison reverse is indeed needed in some redundant topologies to assure that convergence is correct.
- what is the difference between route poisoning and poison reverse? Which one of them enters in action first and who sends which of them ? The router whose directly connected subnet fails will send nothing or will peform route poisoning or poison reverse? And the distant router will perform what?
My understanding is that Split horizon tells a router NOT to advertise a subnet received on one of its interface back on that interface, if the metric for that subnet is strictly higher than the metric received on that interface.
I said that poison reverse (or route poisoning???) superseded split horizon, as it allows the router to advertise back the subnet, but with a metric of 16.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...