Review Questions

1.What components or mechanisms of a link state protocol can an attacker target?
2.In what way does the fact that IS-IS is not itself an IP protocol give it a security advantage over OSPF?
3.What is “fightback” behavior?
4.Why is simple password authentication less desirable that MD5 authentication?
5.What is a message digest, and how does it protect the keys used for authentication?
6.What is the benefit of the OSPF Key ID?
7.What is the purpose of the OSPF cryptographic sequence number in MD5 authentication?
8.In what way is IS-IS more vulnerable to replay attack than OSPF?
9.What three authentication scopes are defined for IS-IS? How do the three scopes differ in regard to the carrying of the Authentication Information TLV? ...

Get OSPF and IS-IS: Choosing an IGP for Large-Scale Networks now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.