Hashing Authentication

The basic operation of hashing authentication bears some similarity to plain text authentication. Notably different, however, is how hashing authentication never transmits a key across a network, instead sending the hash digest (that is, the result of running a hashing algorithm on a router’s configured password).

The hashing authentication process follows a procedure that can generally be summarized as follows:

Image

Step 1. A hashing algorithm is run on a routing update along with a router’s configured key. The result of the hashing algorithm (that is, the hash digest) is added to the end of the routing update, which is then ...

Get CCNP Routing and Switching ROUTE 300-101 Official Cert Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.