When you earned your CCNA, you thought you learned every thing there is to know about RIP. Close, but not rather! There are some additional specifics you need to have to know to pass the BSCI exam and get 1 step closer to the CCNP exam, and one of those entails RIP update packet authentication. You are familiar with some benefits of employing RIPv2 more than RIPv1, assistance for VLSM chief amongst them. To research additional information, please check out: [http://donethisbefore.com/blog/view/48243/are-you-able-to-survive-googles-jagger-update perry belcher resources]. In case you choose to learn more on [http://diyhistory.lib.uiowa.edu/w/index.php?title=Get_Down_With_MySpace_Backgrounds_98858 Get Down With MySpace Backgrounds 98858 - DIYHistory], there are many resources people should pursue. But one advantage that you are not introduced to in your CCNA studies is the capability to configure routing update packet authentication. You have two choices, clear text and MD5. Identify new resources on our favorite partner essay by navigating to [http://www.science-community.org/en/node/107023 perry belcher resource]. Clear text is just that - a clear text password that is visible by any individual who can choose a packet off the wire. If you happen to be going to go to the difficulty of configuring update authentication, you should use MD5. The MD stands for Message Digest, and this is the algorithm that produces the hash value for the password that will be contained in the update packets. Not only should the routers agree on the password, they need to agree on the authentication technique. If 1 router sends an MD5-hashed password to another router that is configured for clear-text authentication, the update will not be accepted. debug ip rip is a great command for troubleshooting authenticated updates. R1, R2, and R3 are operating RIP over a frame relay cloud. Right here is how RIP authentication would be configured on these 3 routers. R1#conf t R1config#crucial chain RIP < The key chain can have any name. R1config-keychain#essential 1 < Key chains can have multiple keys. Number them carefully when using multiples. R1config-keychain-crucial#crucial-string CISCO < This is the text string the key will use for authentication. R1config#int s0 R1config-if#ip rip authentication mode text < The interface will use clear-text mode. R1config-if#ip rip authentication key-chain RIP < The interface is using key chain RIP, configured earlier. R2#conf t R2config#essential chain RIP R2config-keychain#key 1 R2config-keychain-important#essential-string CISCO R2config#int s0.123 R2config-subif#ip rip authentication mode text R2config-subif#ip rip authentication key-chain RIP R3#conf t R3config#crucial chain RIP R3config-keychain#crucial 1 R3config-keychain-essential#crucial-string CISCO R3config#int s0.31 R3config-subif#ip rip authentication mode text R3config-subif#ip rip authentication important-chain RIP To use MD5 authentication rather than clear-text, just replace the word text in the ip rip authentication mode command with md5. Heres what a effectively authentication RIPv2 packet looks like, courtesy of debug ip rip. Clear-text authentication is in impact and the password is cisco. 3d04h: RIP: received packet with text authentication cisco 3d04h: RIP: received v2 update from 150.1.1.3 on Ethernet0 3d04h: one hundred.../8 by means of ... in 1 hops 3d04h: 150.1.2./24 through ... in 1 hops Heres what it looks like when the remote device is set for MD5 authentication and the local router is set for clear-text. You will also see this message if the password itself is incorrect. 3d04h: RIP: ignored v2 packet from 150.1.1.3 invalid authentication Debug ip rip may be a straightforward command as compared to the debugs for other protocols. Click this hyperlink [http://donethisbefore.com/blog/view/50649/pimp-myspace-profiles-can-attract-a-lot-of-visitors perry belcher update] to check up when to consider this belief. but it is also a really potent debug. Commence utilizing debugs as early as feasible in your Cisco studies to learn how router commands really operate!.
There are no comments on this page.
Valid XHTML :: Valid CSS: :: Powered by WikkaWiki