CCNA Experiment 24 Security of routing updates
Environment: Windows XP , GNS3.0.7.2
Objective:
Learn how to pass MD5 authentication and passive port protection routing updates, Note that both methods are in EIGRP ,OSPF, RIP, IGRP can be used in all routing protocols.
Description
MD5 Certification : to prevent invalid routing updates from potentially threatening and damaging the network through routing update authentication between neighbor routers.
Passive interface: the ability to prevent unnecessary routing updates from entering a network prevents the advertising of routes from being advertised to a segment that is not in a secure management area, and can also prevent eigrp,ospf,isis of the HELLO the passage of the package. In addition, you can prevent protocols such as RIP from sending any broadcast and multicast updates to an interface.
650) this.width=650; "src=" Http://hi.csdn.net/attachment/201011/22/0_1290403486GR60.gif "/>
Configuration R1 and the R2 :
router>en
Router#conf T
Router (config) #host R1
R1 (config) #int loopback 0
R1 (config-if) #ip add 10.10.10.10 255.255.255.0
R1 (config-if) #no sh
R1 (config-if) #exit
R1 (config) #int e0/0
R1 (config-if) #ip add 192.168.2.1 255.255.255.0
R1 (config-if) #no sh
R1 (config-if) #exit
R1 (config) #route rip
R1 (config-router) #version 2
R1 (config-router) #network 10.10.10.0
R1 (config-router) #network 192.168.2.0
R1 (config-router) #no auto-summary
R1 (Config-router) #end
router>en
Router#conf T
Router (config) #host R2
R2 (config) #int loopback 0
R2 (config-if) #
R2 (config-if) #ip add 11.11.11.11 255.255.255.0
R2 (config-if) #no sh
R2 (config-if) #exit
R2 (config) #int e0/0
R2 (config-if) #ip add 192.168.2.2 255.255.255.0
R2 (config-if) #no sh
R2 (config-if) #exit
R2 (config) #router rip
R2 (config-router) #version 2
R2 (config-router) #network 11.11.11.0
R2 (config-router) #network 192.168.2.0
R2 (config-router) #no auto-summary
R2 (Config-router) #end
to view the routing tables for the current R1 and R2 :
650) this.width=650; "src=" Http://hi.csdn.net/attachment/201011/22/0_1290403575c976.gif "/>
650) this.width=650; "src=" Http://hi.csdn.net/attachment/201011/22/0_129040358927W7.gif "/>
in the R1 on the configuration MD5 Certifications:
R1#conf T
R1 (config) #key chain kkfloat//Specify a key chain name Kkfloat
R1 (Config-keychain) #key 1// Define a key
R1 (Config-keychain-key) #key-string kkey//password to define the key
R1 (Config-keychain-key) #end// Exit
R1#conf T
R1 (config) #int e0/0//Enter the E0/0 interface that requires authentication
R1 (config-if) #ip RIP authentication Key-chain kkfloat// use of key chains kkfloat
R1 (config-if) #ip RIP authentication mode MD5// define the authentication mode as MD5, If you use text indicates clear text authentication , If the mode is not specified, the default is clear-Text authentication
R1 (config-if) #exit// Exit
r2#clear IP Rou *// clear R2 current route table record
r2#sh IP rou// Show all routes of the current routing table
View current R2 The routing table:
650) this.width=650; "src=" Http://hi.csdn.net/attachment/201011/22/0_1290403691O8oC.gif "/>
in the R2 on the configuration and R1 the same MD5 Certifications
R2#conf T
R2 (config) #key chain kkfloat
R2 (config-keychain) #key 1
R2 (Config-keychain-key) #key-string Kkey
R2 (Config-keychain-key) #end
R2#conf T
R2 (config) #int e0/0
R2 (config-if) #ip RIP authentication Key-chain kkfloat
R2 (config-if) #ip RIP authentication mode MD5
R2 (config-if) #end
re-view R2 The routing table:
650) this.width=650; "src=" Http://hi.csdn.net/attachment/201011/22/0_1290403775T0Zg.gif "/>
Configuration The e0/0 port of the R1 is the passive interface:
R1#clear IP Rou *
R1#conf T
R1 (config) #router rip// enter RIP configuration mode
R1 (config-router) #passive-interface e0/0// Configure e0/0 port as passive port
R1 (Config-router) #exit// exit
R2#clear IP Rou *
R2#sh IP Rou
Check the current R2 and the R1 routing table changes:
650) this.width=650; "src=" Http://hi.csdn.net/attachment/201011/22/0_1290403927lv9o.gif "/>
650) this.width=650; "src=" Http://hi.csdn.net/attachment/201011/22/0_1290403973KOLO.gif "/>
This is the end of the experiment.
This article from "Liu Fengyuan" blog, declined reprint!
CCNA Experiment 24 Security of routing updates