Skip to main content

Securing Routing updates (Routing Authentication)

Router
ASA
RIP v2
!
key chain RIP
 key 1   
  key-string cisco
!
router rip
 version 2
 network 136.1.0.0
 network 150.1.0.0
 no auto-summary
!
interface FastEthernet0/0
 ip address 136.1.121.1 255.255.255.0
 ip rip authentication mode md5
 ip rip authentication key-chain RIP
end
!
!
router rip
 network 10.0.0.0
 network 136.1.0.0
 version 2
 no auto-summary
!
interface Ethernet0/1
 description ** Inside  Interface **
 nameif inside
 security-level 100
 ip address 136.1.121.12 255.255.255.0
 rip authentication mode md5
 rip authentication key <removed> key_id 1
OSPF v2
Simple
!
router ospf 1
 router-id 150.1.3.3
 log-adjacency-changes
 area 0 authentication
 network 136.1.0.0 0.0.0.255 area 0
 network 150.1.3.3 0.0.0.0 area 0
!
interface FastEthernet0/0
 ip address 136.1.0.3 255.255.255.0
 ip ospf authentication-key cisco
end
!
MD5-Hash
!
interface FastEthernet0/0
 ip address 136.1.124.4 255.255.255.0
 ip ospf authentication message-digest
 ip ospf message-digest-key 1 md5 cisco
end
!


Simple
!
router ospf 1
 router-id 150.1.12.12
 network 136.1.0.0 255.255.255.0 area 0
 area 0 authentication
 log-adj-changes
!
!
interface Ethernet0/0
 description ** Outside Interface **
 nameif outside
 security-level 0
 ip address 136.1.0.12 255.255.255.0
 ospf authentication-key cisco
!
MD5-Hash
!
nterface Ethernet0/2
 nameif dmz2
 security-level 50
 ip address 136.1.124.12 255.255.255.0
 ospf message-digest-key 1 md5 <removed>
 ospf authentication message-digest
!


EIGRP
!
router eigrp 1
 network 136.1.0.0
 no auto-summary
!
!
interface FastEthernet0/0
 ip address 136.1.124.4 255.255.255.0
 ip authentication mode eigrp 1 md5
 ip authentication key-chain eigrp 1 EIGRP
 duplex auto
 speed auto
end
!
!
router eigrp 1
 no auto-summary
 network 136.1.0.0 255.255.0.0
!
!
interface Ethernet0/2.124
 description ** DMZ2 VLAN **
 nameif dmz2
 security-level 50
 ip address 136.1.124.12 255.255.255.0
 authentication key eigrp 1 <removed> key-id 1
 authentication mode eigrp 1 md5
!

Comments

Popular posts from this blog

Image Recovery Using ROMMON mode

If incase ASA system image is lost or got corrupted we can recover it by booting ASA in ROMMON mode and executing following commands please refer above mentioned diagram. Step 1: Make sure you have assigned the right IP address to the PC which has ASA system image and tftp installed. Step 2: Set the following parameters rommon #0> address 10.1.1.254 rommon #1 > server 10.1.1.1 rommon #2> interface GigabitEthernet0/0 GigabitEthernet0/1 MAC Address: 000f. f775.4b54 rommon #3> file asa801 -k8. bin Step 3: Verify your configured parameters in ROMON mode rommon #4> set ROMMON Variable Settings: ADDRESS=10.1.1.254 SERVER=10.1.1.1 PORT=GigabitEthernet0/0 VLAN=untagged IMAGE=asa801-k8. bin CONFIG= rommon #12> set ROMMON Variable Settings: ADDRESS=10.1.1.50 SERVER=10.1.1.1 ------- output omitted for brevity ----- rommon #13> unset ADDRESS ROMMON Variable Settings: ADDRESS=0.0.0.0 SERVER=10.1.1.1 GATEWAY=0.0.0.0 ------- output omitted f...

VPN Site-to-Site IOS

In this tutorial I am going to show you how we can configure site to site VPN on two IOS routers. In this example I have used 3750 Router in emulated environment. VPN stands for Virtual Private Network, in which you extend your corporate network across internet in secure fashion. In VPN it has different types and two main types are as follows: Site-to-Site VPN Remote Access VPN Site-to-Site is manly used to do connectivity between HQ and branches. Whereas, Remote Access is mainly used by mobile user, software is installed and proper credentials provided so that they can connect to Corporate Network from anywhere and can access anything they are authorized for. Following is diagram with related information we need to start with. So there are following steps your need to do on both routers in order to make them communicate over the Service Provider Network Securely. Step 1: IKE Phase 1 Step 2: IKE Phase key Step 3: IKE Phase 2 (transform-set) Step 4: Interested traffic (wh...