NinaWilhoit550

인디사이드위키
이동: 둘러보기, 검색

When you earned your CCNA, you believed you learned anything there is to know about RIP. Close, but not very There are some added specifics you need to have to know to pass the BSCI exam and get one step closer to the CCNP exam, and one particular of these involves RIP update packet authentication. You happen to be familiar with some advantages of using RIPv2 over RIPv1, support for VLSM chief amongst them. But one particular advantage that you are not introduced to in your CCNA studies is the ability to configure routing update packet authentication. You have two options, clear text and MD5. Clear text is just that - a clear text password that is visible by any individual who can choose a packet off the wire. If you happen to be going to go to the difficulty of configuring update authentication, you must use MD5. To learn more, please consider checking out Protectimus Launches New One-time Password Service As Alternative To The Two Factor Authentication Provider. The MD stands for "Message Digest", and this is the algorithm that generates the hash value for the password that will be contained in the update packets. Not only must the routers agree on the password, they need to agree on the authentication method. Dig up further on this affiliated article - Navigate to this link http://finance.dailyherald.com/dailyherald/news/read/30038105/protectimus_launches_new_one. To check up more, please consider peeping at http://www.valleynewslive.com/story/29270099/protectimus-launches-new-one-time-password-service-as-alternative-to-the-two-factor-authentication-provider. If one router sends an MD5-hashed password to an additional router that is configured for clear-text authentication, the update will not be accepted. debug ip rip is a great command for troubleshooting authenticated updates. R1, R2, and R3 are operating RIP over a frame relay cloud. Right here is how RIP authentication would be configured on these 3 routers. R1#conf t R1config#crucial chain RIP The key chain can have any name. R1config-keychain#essential 1 Key chains can have multiple keys. Number them carefully when using multiples. R1config-keychain-essential#crucial-string CISCO This is the text string the key will use for authentication. R1config#int s0 R1config-if#ip rip authentication mode text The interface will use clear-text mode. R1config-if#ip rip authentication essential-chain RIP The interface is using key chain RIP, configured earlier. R2#conf t R2config#crucial chain RIP R2config-keychain#crucial 1 R2config-keychain-essential#crucial-string CISCO R2config#int s0.123 R2config-subif#ip rip authentication mode text R2config-subif#ip rip authentication crucial-chain RIP R3#conf t R3config#essential chain RIP R3config-keychain#essential 1 R3config-keychain-key#key-string CISCO R3config#int s0.31 R3config-subif#ip rip authentication mode text R3config-subif#ip rip authentication crucial-chain RIP To use MD5 authentication rather than clear-text, simply replace the word "text" in the ip rip authentication mode command with md5. Heres what a successfully authentication RIPv2 packet looks like, courtesy of debug ip rip. Clear-text authentication is in impact and the password is "cisco". 3d04h RIP received packet with text authentication cisco 3d04h RIP received v2 update from 150.1.1.3 on Ethernet0 3d04h one hundred.../eight through ... in 1 hops 3d04h 150.1.2./24 by means of ... in 1 hops Heres what it looks like when the remote device is set for MD5 authentication and the nearby router is set for clear-text. You are going to also see this message if the password itself is incorrect. 3d04h RIP ignored v2 packet from 150.1.1.3 invalid authentication "Debug ip rip" might be a straightforward command as compared to the debugs for other protocols. but its also a very powerful debug. If you think anything at all, you will possibly desire to discover about Protectimus Launches New One-time Password Service As Alternative To The Two Factor Authentication Provider. Commence making use of debugs as early as possible in your Cisco research to understand how router commands actually operate.