O'Reilly logo

Network Security Principles and Practices by Saadat Malik

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Case Study: Securing the OSPF Routing Protocol

OSPF is a very commonly used interior gateway protocol. This case study talks about some key ways to improve security in an OSPF implementation. The basic principles motivating these configurations remain the same.

OSPF Router Authentication

OSPF neighbor router authentication works by authenticating the source of any OSPF routes received on the router. Any routes coming from a source that cannot be authenticated are discarded. Example 4-12 shows how authentication is setup in OSPF.

Example 4-12. Setting Up OSPF for MD5 Hash Authentication
interface ethernet1
ip address 10.1.1.1 255.255.255.0
!The command below defines a key-ID, 100, the hashing method to use, md5, and the
							!actual key to use in ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required