14.16 Authentication Options with Different Routing Protocols

Here is a chart showing routing protocol authentication mechanism compatibility with various routing protocols: Note that OSPFv2 supports all authentication types as well as provide key chain support. In contrast, OSPFv3 does not use built-in authentication mechanisms like OSPFv2, instead relying upon IPv6 native security capabilities, which use IPsec. The IPsec security policy specifies the … Continue reading 14.16 Authentication Options with Different Routing Protocols

14.14 Hashing Authentication Process

The following illustration represents the exchange of keys in a hashed authentication scenario: The hash is generated based on the key and the specific routing update payload being sent. The hash is appended to the routing update and sent; the hash is not part of the key, but merely transmitted alongside it.The receiving router calculates … Continue reading 14.14 Hashing Authentication Process

14.12 Authentication Types

There are two types of authentication that can be configured for routing protocols: Simple password authenticationRouter sends a packet and keyKeys are checked to see if they matchProcess is not secure; it uses cleartextHashing authenticationRouter creates a message digest based on the hashed value of the key and the packet sentThe message digest is sent … Continue reading 14.12 Authentication Types

14.11 Purpose of Routing Protocol Authentication

Routing Protocol Authentication is used to prevent illegitimate sources from poisoning routing information within our devices' routing tables. In this manner, only authorized routing peers are able to exchange updates. Though each routing protocol has marked differences in how they authenticate, each packet is generally authenticated using the authentication configuration applied to the routing process. … Continue reading 14.11 Purpose of Routing Protocol Authentication

14.8 Configuration Backups

Periodic backups are crucial to recovery processes. The archive feature in Cisco IOS can automate periodic backups of configuration for expedited recovery. In the example above, the archive section specifies an FTP operation, where $h represents the host name for the local device. TFTP can be used as well. Note the time period is specified … Continue reading 14.8 Configuration Backups