28.06.2014 Views

Discussion

Discussion

Discussion

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Solution<br />

You configure MD5 authentication for OSPF:<br />

[edit protocols ospf area 0.0.0.0]<br />

aviva@RouterG# set authentication-type md5<br />

aviva@RouterG# set interface fe-0/0/1 authentication md5 1 key $1991poPPi<br />

aviva@RouterG# set interface fe-1/0/1 authentication md5 1 key $1991poPPi<br />

aviva@RouterG# show<br />

authentication-type md5;<br />

interface fe-0/0/1.0 {<br />

authentication {<br />

md5 1 key "$9$dEbgoZUjqP5GUApO1hcgoaJHq"; ## SECRET-DATA<br />

}<br />

}<br />

interface fe-1/0/1.0 {<br />

authentication {<br />

md5 1 key "$9$dEbgoZUjqP5GUApO1hcgoaJHq"; ## SECRET-DATA<br />

}<br />

}<br />

<strong>Discussion</strong><br />

It is a good security measure to authenticate OSPF protocol packet exchanges to<br />

ensure that only trusted routers participate in the OSPF network and in the exchange<br />

of Hello and LSA packets.<br />

This recipe shows how to configure OSFP to use MD5 authentication. First, configure<br />

MD5 authentication for the entire area, then set the key, or password, for each<br />

interface. Each key has an identifier; here, it is 1. MD5 creates an encoded checksum<br />

that is included in all transmitted OSPF packets. The receiving router verifies this<br />

checksum before accepting the packet.<br />

When you display the router’s configuration after you have typed the password, you<br />

do not see the password itself, only the encrypted form of the password. Someone<br />

casually glancing through the configuration would not see the actual password.<br />

You can also configure a simple password for OSPF authentication, which includes a<br />

plain-text password in the transmitted OSPF packets. Plain-text passwords are easy<br />

to break by devices that sniff network traffic, so you should never use them when<br />

your goal is network security.<br />

For authentication to work across the entire OSPF domain, you need to configure<br />

MD5 authentication with the same key identifier and the same password on all OSPF<br />

interfaces, as shown in this recipe. Once you have the encrypted version of the password,<br />

you can use it in the authentication-key statement instead of the password<br />

itself. This is one way to minimize the number of people who see the actual password.<br />

aviva@RouterG# set interface fe-1/0/1 authentication 1 key<br />

"$9$dEbgoZUjqP5GUApO1hcgoaJHq"<br />

Enabling OSPF Authentication | 403<br />

This is the Title of the Book, eMatter Edition<br />

Copyright © 2008 O’Reilly & Associates, Inc. All rights reserved.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!