CCNA Experiment 24 Security of routing updates

Source: Internet
Author: User

CCNA Experiment 24 Security of routing updates

Environment: Windows XP , GNS3.0.7.2

Objective:

Learn how to pass MD5 authentication and passive port protection routing updates, Note that both methods are in EIGRP ,OSPF, RIP, IGRP can be used in all routing protocols.


Description

MD5 Certification : to prevent invalid routing updates from potentially threatening and damaging the network through routing update authentication between neighbor routers.

Passive interface: the ability to prevent unnecessary routing updates from entering a network prevents the advertising of routes from being advertised to a segment that is not in a secure management area, and can also prevent eigrp,ospf,isis of the HELLO the passage of the package. In addition, you can prevent protocols such as RIP from sending any broadcast and multicast updates to an interface.

650) this.width=650; "src=" Http://hi.csdn.net/attachment/201011/22/0_1290403486GR60.gif "/>

Configuration R1 and the R2 :

router>en

Router#conf T

Router (config) #host R1

R1 (config) #int loopback 0

R1 (config-if) #ip add 10.10.10.10 255.255.255.0

R1 (config-if) #no sh

R1 (config-if) #exit

R1 (config) #int e0/0

R1 (config-if) #ip add 192.168.2.1 255.255.255.0

R1 (config-if) #no sh

R1 (config-if) #exit

R1 (config) #route rip

R1 (config-router) #version 2

R1 (config-router) #network 10.10.10.0

R1 (config-router) #network 192.168.2.0

R1 (config-router) #no auto-summary

R1 (Config-router) #end

router>en

Router#conf T

Router (config) #host R2

R2 (config) #int loopback 0

R2 (config-if) #

R2 (config-if) #ip add 11.11.11.11 255.255.255.0

R2 (config-if) #no sh

R2 (config-if) #exit

R2 (config) #int e0/0

R2 (config-if) #ip add 192.168.2.2 255.255.255.0

R2 (config-if) #no sh

R2 (config-if) #exit

R2 (config) #router rip

R2 (config-router) #version 2

R2 (config-router) #network 11.11.11.0

R2 (config-router) #network 192.168.2.0

R2 (config-router) #no auto-summary

R2 (Config-router) #end

to view the routing tables for the current R1 and R2 :

650) this.width=650; "src=" Http://hi.csdn.net/attachment/201011/22/0_1290403575c976.gif "/>

650) this.width=650; "src=" Http://hi.csdn.net/attachment/201011/22/0_129040358927W7.gif "/>

in the R1 on the configuration MD5 Certifications:

R1#conf T

R1 (config) #key chain kkfloat//Specify a key chain name Kkfloat

R1 (Config-keychain) #key 1// Define a key

R1 (Config-keychain-key) #key-string kkey//password to define the key

R1 (Config-keychain-key) #end// Exit

R1#conf T

R1 (config) #int e0/0//Enter the E0/0 interface that requires authentication

R1 (config-if) #ip RIP authentication Key-chain kkfloat// use of key chains kkfloat

R1 (config-if) #ip RIP authentication mode MD5// define the authentication mode as MD5, If you use text indicates clear text authentication , If the mode is not specified, the default is clear-Text authentication

R1 (config-if) #exit// Exit

r2#clear IP Rou *// clear R2 current route table record

r2#sh IP rou// Show all routes of the current routing table

View current R2 The routing table:

650) this.width=650; "src=" Http://hi.csdn.net/attachment/201011/22/0_1290403691O8oC.gif "/>


in the R2 on the configuration and R1 the same MD5 Certifications

R2#conf T

R2 (config) #key chain kkfloat

R2 (config-keychain) #key 1

R2 (Config-keychain-key) #key-string Kkey

R2 (Config-keychain-key) #end

R2#conf T

R2 (config) #int e0/0

R2 (config-if) #ip RIP authentication Key-chain kkfloat

R2 (config-if) #ip RIP authentication mode MD5

R2 (config-if) #end


re-view R2 The routing table:

650) this.width=650; "src=" Http://hi.csdn.net/attachment/201011/22/0_1290403775T0Zg.gif "/>

Configuration The e0/0 port of the R1 is the passive interface:

R1#clear IP Rou *

R1#conf T

R1 (config) #router rip// enter RIP configuration mode

R1 (config-router) #passive-interface e0/0// Configure e0/0 port as passive port

R1 (Config-router) #exit// exit

R2#clear IP Rou *

R2#sh IP Rou

Check the current R2 and the R1 routing table changes:

650) this.width=650; "src=" Http://hi.csdn.net/attachment/201011/22/0_1290403927lv9o.gif "/>

650) this.width=650; "src=" Http://hi.csdn.net/attachment/201011/22/0_1290403973KOLO.gif "/>

This is the end of the experiment.


This article from "Liu Fengyuan" blog, declined reprint!

CCNA Experiment 24 Security of routing updates

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.