{"id":67,"date":"2008-09-03T09:23:30","date_gmt":"2008-09-03T07:23:30","guid":{"rendered":"http:\/\/wp1.fredptitgars.net\/index.php\/2008\/09\/03\/quelques-config-dun-routeur-cisco-851\/"},"modified":"2008-09-03T09:23:30","modified_gmt":"2008-09-03T07:23:30","slug":"quelques-config-dun-routeur-cisco-851","status":"publish","type":"post","link":"https:\/\/fredptitgars.ovh\/?p=67","title":{"rendered":"quelques config d&rsquo;un routeur cisco 851"},"content":{"rendered":"<p>La commande no ip redirects apparait optionnellement dans la d\u00e9claration d&rsquo;une interface. Elle indique que le routeur ne doit ni g\u00e9n\u00e9rer, ni accepter de paquets ICMP Redirect.<\/p>\n<p>Les paquets ICMP redirect sont g\u00e9n\u00e9r\u00e9s dans les conditions suivantes:<\/p>\n<p>    * La machine A consid\u00e8re que la route vers B passe par le routeur R<br \/>\n    * Le routeur R re\u00e7oit de la part de A un paquet destin\u00e9 \u00e0 B. Or, le routeur R constate qu&rsquo;il a une route directe \u00e0 la fois vers A et B par la m\u00eame interface I. Le routeur R consid\u00e8re donc que A aurait pu envoyer directement le paquet vers B, sans passer par lui.<br \/>\n    * Le routeur R transmet le paquet vers B et envoie \u00e0 A un paquet ICMP redirect demandant \u00e0 A de modifier ses tables de routage de fa\u00e7on \u00e0 acc\u00e9der directement \u00e0 B. <\/p>\n<p>L&rsquo;utilisation de paquets ICMP redirects pourrait alt\u00e9rer la politique de routage d\u00e9finie par l&rsquo;administrateur du r\u00e9seau. Il est donc prudent de rejeter ces paquets. <\/p>\n<h2>ip redirects<\/h2>\n<p>To enable the sending of Internet Control Message Protocol (ICMP) redirect messages if the Cisco IOS software is forced to resend a packet through the same interface on which it was received, use the ip redirects command in interface configuration mode. To disable the sending of redirect messages, use the no form of this command.<\/p>\n<p><code><br \/>\nip redirects<\/p>\n<p>no ip redirects<br \/>\n<\/code><\/p>\n<p><strong>Syntax Description<\/strong><\/p>\n<p>This command has no arguments or keywords.<\/p>\n<p><strong>Defaults<\/strong><\/p>\n<p>Enabled<\/p>\n<p><strong>Command Modes<\/strong><\/p>\n<p>Interface configuration<\/p>\n<p><strong>Command History<\/strong><\/p>\n<table>\n<tbody>\n<tr class='row_even'>\n<td><strong>Release<\/strong><\/td>\n<td> <strong>Modification<\/strong><\/td>\n<\/tr>\n<tr class='row_odd'>\n<td>10.0<\/td>\n<td>This command was introduced.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>Usage Guidelines<\/strong><\/p>\n<p>Previously, if the Hot Standby Router Protocol (HSRP) was configured on an interface, ICMP redirect messages were disabled by default for the interface. With Cisco IOS Release 12.1(3)T, ICMP redirect messages are enabled by default if HSRP is configured.<\/p>\n<p><strong>Examples<\/strong><\/p>\n<p>The following example enables the sending of ICMP redirect messages on Ethernet interface 0:<\/p>\n<p>interface ethernet 0<\/p>\n<p> ip redirects<\/p>\n<p><strong>Related Commands<\/strong><\/p>\n<table>\n<tbody>\n<tr class='row_even'>\n<td><strong>Command<\/strong><\/td>\n<td><strong>Description<\/strong><\/td>\n<\/tr>\n<tr class='row_odd'>\n<td>ip default-gateway<\/td>\n<td>Defines a default gateway (router) when IP routing is disabled.<\/td>\n<\/tr>\n<tr class='row_even'>\n<td>show ip redirects<\/td>\n<td>Displays the address of a default gateway (router) and the address of hosts for which an ICMP redirect message has been received. <\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>La commande no ip redirects apparait optionnellement dans la d\u00e9claration d&rsquo;une interface. Elle indique que le routeur ne doit ni g\u00e9n\u00e9rer, ni accepter de paquets ICMP Redirect. Les paquets ICMP redirect sont g\u00e9n\u00e9r\u00e9s dans les conditions suivantes: * La machine A consid\u00e8re que la route vers B passe par le routeur R * Le routeur [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[24],"tags":[],"class_list":["post-67","post","type-post","status-publish","format-standard","hentry","category-cisco"],"blocksy_meta":[],"_links":{"self":[{"href":"https:\/\/fredptitgars.ovh\/index.php?rest_route=\/wp\/v2\/posts\/67","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fredptitgars.ovh\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fredptitgars.ovh\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fredptitgars.ovh\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/fredptitgars.ovh\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=67"}],"version-history":[{"count":0,"href":"https:\/\/fredptitgars.ovh\/index.php?rest_route=\/wp\/v2\/posts\/67\/revisions"}],"wp:attachment":[{"href":"https:\/\/fredptitgars.ovh\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=67"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fredptitgars.ovh\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=67"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fredptitgars.ovh\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=67"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}