www.firewall.cx Open in urlscan Pro
209.133.197.122  Public Scan

URL: https://www.firewall.cx/networking/routing-protocols/routing-protocol-igrp.html
Submission: On July 13 via api from FI — Scanned from FI

Form analysis 2 forms found in the DOM

GET /component/finder/search.html?Itemid=101

<form id="search-tm-3" action="/component/finder/search.html?Itemid=101" method="get" role="search" class="uk-search js-finder-searchform uk-search-default"><span uk-search-icon="" class="uk-position-z-index uk-icon uk-search-icon"><svg width="20"
      height="20" viewBox="0 0 20 20">
      <circle fill="none" stroke="#000" stroke-width="1.1" cx="9" cy="9" r="7"></circle>
      <path fill="none" stroke="#000" stroke-width="1.1" d="M14,14 L18,18 L14,14 Z"></path>
    </svg></span>
  <div class="awesomplete"><input name="q" class="js-finder-search-query uk-search-input" placeholder="Search" required="" aria-label="Search" type="search" autocomplete="off" aria-expanded="false" aria-owns="awesomplete_list_1" role="combobox">
    <ul hidden="" role="listbox" id="awesomplete_list_1"></ul><span class="visually-hidden" role="status" aria-live="assertive" aria-atomic="true">Type 2 or more characters for results.</span>
  </div><input type="hidden" name="Itemid" value="101">
</form>

Name: formAcym32471POST /component/acym/frontusers.html?tmpl=component

<form enctype="multipart/form-data" id="formAcym32471" name="formAcym32471" method="POST" action="/component/acym/frontusers.html?tmpl=component" onsubmit="return submitAcymForm('subscribe','formAcym32471', 'acymSubmitSubForm')">
  <div class="acym_module_form">
    <div class="acym_form">
      <div class="onefield fieldacy1 acyfield_text" id="field_1"><input name="user[name]" placeholder="Name" value=""
          data-authorized-content="{&quot;0&quot;:&quot;all&quot;,&quot;regex&quot;:&quot;&quot;,&quot;message&quot;:&quot;Incorrect value for the field Name&quot;}" type="text" class="cell  ">
        <div class="acym__field__error__block" data-acym-field-id="1"></div>
      </div>
      <div class="onefield fieldacy2 acyfield_text" id="field_2"><input id="email_field_572" name="user[email]" placeholder="Email" value=""
          data-authorized-content="{&quot;0&quot;:&quot;all&quot;,&quot;regex&quot;:&quot;&quot;,&quot;message&quot;:&quot;Incorrect value for the field Email&quot;}" required="" type="email" class="cell acym__user__edit__email  ">
        <div class="acym__field__error__block" data-acym-field-id="2"></div>
      </div>
    </div>
    <p class="acysubbuttons">
      <noscript> Please enable the javascript to submit this form</noscript>
      <input type="button" class="btn btn-primary button subbutton" value="Subscribe" name="Submit"
        onclick="try{ return submitAcymForm('subscribe','formAcym32471', 'acymSubmitSubForm'); }catch(err){alert('The form could not be submitted '+err);return false;}">
    </p>
  </div>
  <input type="hidden" name="ctrl" value="frontusers">
  <input type="hidden" name="task" value="notask">
  <input type="hidden" name="option" value="com_acym">
  <input type="hidden" name="ajax" value="1">
  <input type="hidden" name="successmode" value="replace">
  <input type="hidden" name="acy_source" value="Module n°143">
  <input type="hidden" name="hiddenlists" value="2">
  <input type="hidden" name="fields" value="name,email">
  <input type="hidden" name="acyformname" value="formAcym32471">
  <input type="hidden" name="acysubmode" value="mod_acym">
  <input type="hidden" name="confirmation_message" value="">
</form>

Text Content

Skip to main content
 * 
 * Networking
   * Network Fundamentals
   * Network Cabling
   * OSI Model
   * Ethernet Protocol
   * Network Protocols
     * TCP-UDP Protocol
     * IP Protocol
     * Subnetting
     * Supernetting & CIDR
     * ICMP Protocol
     * Domain Name System (DNS)
     * Spanning Tree Protocol (STP)
     * Netflow
   * VLAN Networks
   * Network Address Translation
   * Routing
 * Cisco
   * Cisco Routers
   * Cisco Switches
   * Cisco Firewalls
   * Cisco Wireless
   * Cisco CallManager-CCME
   * Cisco Data Center (Nexus/UCS)
   * Cisco Services & Technologies
 * Security
   * Palo Alto Networks
   * F5 Networks
   * SASE & SD-WAN
   * Security Service Edge (SSE)
   * Web Application Vulnerability Scanners
   * VPN Services & Guides
 * Operating Systems
   * Microsoft
     * Windows Servers
     * Windows Workstations (XP, 7, 8, 10, 11)
   * Linux - Unix
   * Virtualization & VM Backup
 * Tools-Tips-Reviews
   * ManageEngine
     * OpManager - Network Monitoring & Management
     * ManageEngine Firewall Analyzer
   * Network Protocol Analyzers
   * IP PBX - Unified Communications
   * Security Articles
   * Reviews & Interviews
   * Products
     * GFI Network Security
     * OpenMosix - Linux Supercomputer
   * More Reading
   * News & Annoucements
     * Archive
   * Firewall.cx News
     * Archive
 * Downloads

Thursday, 13 July 2023
Type 2 or more characters for results.
 * 
 * Networking
    * Network Fundamentals
    * Network Cabling
    * OSI Model
    * Ethernet Protocol
    * Network Protocols
      * TCP-UDP Protocol
      * IP Protocol
      * Subnetting
      * Supernetting & CIDR
      * ICMP Protocol
      * Domain Name System (DNS)
      * Spanning Tree Protocol (STP)
      * Netflow
    * VLAN Networks
    * Network Address Translation
    * Routing

 * Cisco
    * Cisco Routers
    * Cisco Switches
    * Cisco Firewalls
    * Cisco Wireless
    * Cisco CallManager-CCME
    * Cisco Data Center (Nexus/UCS)
    * Cisco Services & Technologies

 * Security
    * Palo Alto Networks
    * F5 Networks
    * SASE & SD-WAN
    * Security Service Edge (SSE)
    * Web Application Vulnerability Scanners
    * VPN Services & Guides

 * Operating Systems
    * Microsoft
      * Windows Servers
      * Windows Workstations (XP, 7, 8, 10, 11)
    * Linux - Unix
    * Virtualization & VM Backup

 * Tools-Tips-Reviews
    * ManageEngine
      * OpManager - Network Monitoring & Management
      * ManageEngine Firewall Analyzer
    * Network Protocol Analyzers
    * IP PBX - Unified Communications
    * Security Articles
    * Reviews & Interviews
    * Products
      * GFI Network Security
      * OpenMosix - Linux Supercomputer
    * More Reading
    * News & Annoucements
      * Archive
    * Firewall.cx News
      * Archive

 * Downloads


 * Home
 * Networking
 * Routing
 * Interior Gateway Protocol - IGRP

 * Monitor & Capture
   Bandwidth Spikes
   
   
   FREE DOWNLOAD

 * Free Hyper-V &
   VMware Backup
   
   
   GET 2 VMS FOR FREE!

 * Automatic Patching:
   O/S +750 Apps
   
   
   DOWNLOAD NOW!

 * Log Management:
   All Platforms
   
   
   FREE DOWNLOAD!

 * Free Hyper-V &
   VMware Backup
   
   
   GET 2 VMS FOR FREE!

 * Free Network-Server
   Monitoring
   
   
   MANAGE YOUR NETWORK!



--------------------------------------------------------------------------------




INTERIOR GATEWAY PROTOCOL - IGRP

Article Reads:30768

IGRP (Interior Gateway Routing Protocol) is a Cisco proprietary distance-vector
routing protocol used in enterprise networks to exchange routing information
between routers. IGRP is a predecessor to the more advanced Enhanced Interior
Gateway Routing Protocol (EIGRP) but is still used in some legacy networks. IGRP
is a classful protocol, which means it does not support variable-length subnet
masks (VLSMs) and is limited to classful addressing. In this article, we will
explore IGRP in more detail, covering its hop counts, IGRP timers, limitations,
advantages, and disadvantages.

Article Key Topics:

 * IGRP Hop Count.
 * IGRP Timers.
 * IGRP Limitations.
 * IGRP Advantages & Disadvantages.
 * Summary.


IGRP HOP COUNT

IGRP uses a maximum hop count of 100 by default, meaning that any destination
beyond 100 hops is considered unreachable. IGRP allows network administrators to
set a maximum hop count (255) for each network, which can be customized based on
the network topology. A higher hop count limit allows packets to reach more
remote networks but increases the time required to route the packets.


IGRP TIMERS

IGRP uses several timers to control its operation and prevent routing loops. The
main IGRP timers are the update timer, hold-down timer, flush timer, and invalid
timer.

Update Timer: The update timer controls how often IGRP routers send routing
updates to their neighboring routers. By default, the update timer is set to 90
seconds.

Hold-Down Timer: The hold-down timer prevents routers from accepting routing
information about a network that is not available. This timer is activated when
a router detects that a network is down, preventing other routers from
advertising the same network for a set period.

Flush Timer: The flush timer removes a route from the routing table when it has
not been updated for a certain period, preventing outdated information from
being used.

Invalid Timer: The invalid timer is used to determine when a route should be
marked as invalid. If a router has not received an update about a particular
route after the invalid timer expires, the route is marked as invalid and
removed from the routing table.


IGRP LIMITATIONS

One of the main limitations of IGRP is its classful addressing scheme, which
does not support VLSMs. This means that network administrators must use subnets
of the same size across the entire network, limiting the network's scalability.
Additionally, IGRP has a limited hop count of 100, which can prevent packets
from reaching remote networks. IGRP is also susceptible to routing loops, where
packets are sent in a loop between routers, leading to congestion and delays.
Finally, IGRP is a proprietary protocol that is only compatible with Cisco
routers, limiting interoperability with routers from other vendors.


IGRP ADVANTAGES AND DISADVANTAGES

One of the main advantages of IGRP is its ease of use and configuration. IGRP is
relatively easy to set up and configure, making it a good choice for small to
medium-sized networks. Additionally, IGRP has lower bandwidth usage compared to
other routing protocols, making it ideal for networks with limited bandwidth.
IGRP also supports unequal-cost load balancing, which allows routers to use
multiple paths to reach a destination, improving network efficiency.

However, IGRP also has several disadvantages. One of the main disadvantages of
IGRP is its limited scalability, due to its classful addressing scheme and
maximum hop count of 100. This makes it unsuitable for large networks that
require VLSMs and the ability to reach remote networks. Additionally, IGRP is
prone to routing loops and convergence issues, which can lead to network
congestion and delays. Finally, IGRP is a proprietary protocol, meaning that it
is not an open standard and is only compatible with Cisco routers, limiting
interoperability with other vendors' routers.


SUMMARY

In this article we talked about IGRP, explained  a Cisco proprietary
distance-vector routing protocol used in enterprise networks to exchange routing
information between routers. We talked about it being a classful protocol,
analyzed its four different timers (update timer, hold-down timer, flush timer,
and invalid timer), hop counts and more. Finally, we talked about the advantages
and disadvantages of the IGRP protocol.


YOUR IP ADDRESS:

185.204.1.182


SECURITY SERVICE EDGE (SSE)




FREE HYPER-V & VMWARE BACKUP




WI-FI KEY GENERATOR

Generate/Crack any
WEP, WPA, WPA2 Key!
Access Now!


NETWORK AND SERVER MONITORING




FOLLOW FIREWALL.CX

Please enable the javascript to submit this form


RECOMMENDED DOWNLOADS

 * Network Management - Monitor & Alert
 * Free Hyper-V & VMware Backup
 * SD-WAN Networks & Security
 * Bandwidth Monitor
 * Patch Manager Plus
 * EventLog Analyzer


SDWAN & SASE




CISCO PASSWORD CRACK

Decrypt Cisco Type-7 Passwords on the fly!

Decrypt Now!


BANDWIDTH MONITOR




FREE PATCHMANAGER




EVENTLOG ANALYZER



--------------------------------------------------------------------------------


RELATED ARTICLES


OSPF - PART 4: OSPF NEIGHBOR STATES – OSPF NEIGHBOR FORMING PROCESS


DISTANCE VECTOR ROUTING PROTOCOLS


OSPF - PART 5: ANALYSIS OF OSPF LINK STATE UPDATE (LSU) - LINK STATE
ADVERTISEMENT (LSA) PACKET STRUCTURE. COMMON LSA TYPES


OSPF - PART 2: HOW OSPF PROTOCOL WORKS & BASIC CONCEPTS: OSPF NEIGHBOR, TOPOLOGY
& ROUTING TABLE, OSPF AREAS & ROUTER ROLES, THEORY & OVERVIEW


OSPF - PART 6: OSPF LSA TYPES - PURPOSE AND FUNCTION OF EVERY OSPF LSA


NETWORKING

 * Fundamentals

 * VLAN Networks

 * Netflow

 * BGP Routing


CISCO

 * Password Crack

 * Firewalls

 * Nexus

 * Wireless


SECURITY

 * Palo Alto

 * F5 Networks

 * SASE - SDWAN

 * Network Monitor


COMPANY

 * Advertising

 * Contact Us

 * Sitemap

 * Forums


FOLLOW US


Top

© Copyright 2000 - 2023 Firewall.cx. All rights reserved.Disclaimer Notice