Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Combinatorial testing of key chain in different dynamic routing Protocol Verification

2025-01-30 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

one。 Overview: dynamic routing protocols, except rip v1 can not configure authentication, other routing protocols can be configured with authentication, there are two authentication methods, one is plaintext authentication, the other is MD5 authentication

Reference link: http://blog.sina.com.cn/s/blog_3e5d70910100mxzz.html II. Test ideas and conclusions: a. Idea: ① configures different ways of dynamic routing authentication-including routes and routers, routers and firewalls, plaintext authentication and MD5 authentication ② grabs packets to determine whether the authentication information is a protocol key-ID

b. Conclusion:

three。 Test the topology:

four。 Basic configuration: A.FW1:interface Ethernet0

Nameif Outside

Security-level 0

Ip address 202.100.1.1 255.255.255.0

No shut

Interface Ethernet1

Nameif Inside

Security-level 100

Ip address 192.168.1.1 255.255.255.0 no shutB.R2:interface Loopback0

Ip address 2.2.2.2 255.255.255.0

Interface FastEthernet0/0 ip address 192.168.1.2 255.255.255.0

No shutinterface FastEthernet0/1

Ip address 10.1.1.2 255.255.255.0 no shutC.R3:interface Loopback0

Ip address 3.3.3.3 255.255.255.0

Interface FastEthernet0/0

Ip address 10.1.1.3 255.255.255.0

No shut5. Rip plaintext authentication: a. Router and Router: ① R2:key chain ripkey

Key 1

Key-string cisco

Key 2

Key-string CISCOrouter rip

Version 2

Network 2.0.0.0

Network 10.0.0.0

No auto-summary ② R3:key chain ripkey

Key 1

Key-string CISCO key 2

Key-string ciscorouter rip

Version 2

Network 3.0.0.0

Network 10.0.0.0

No auto-summary

③ grab bag:

R2:

R3:

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report