Review Questions
1. | What components or mechanisms of a link state protocol can an attacker target? |
2. | In what way does the fact that IS-IS is not itself an IP protocol give it a security advantage over OSPF? |
3. | What is “fightback” behavior? |
4. | Why is simple password authentication less desirable that MD5 authentication? |
5. | What is a message digest, and how does it protect the keys used for authentication? |
6. | What is the benefit of the OSPF Key ID? |
7. | What is the purpose of the OSPF cryptographic sequence number in MD5 authentication? |
8. | In what way is IS-IS more vulnerable to replay attack than OSPF? |
9. | What three authentication scopes are defined for IS-IS? How do the three scopes differ in regard to the carrying of the Authentication Information TLV? ... |
Get OSPF and IS-IS: Choosing an IGP for Large-Scale Networks now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.