Configuring RIPv2 authentication on ensp

principle

 

 Experimental simulation

 

 Lab topology

 

 Test connectivity

 

 Rip build network

 

 

 View the routing table

R3 simulated attack first put in his notice of ip network segment

After the configuration check the routing table

You can see the segment has been illegally obtaining information R1R2, then R3 and now we can send a large number of ping packets to two segments, resulting in network congestion, form assault

Next we loopback interface addresses are 192.168.10.254 192.168.20.254, both deceived and notices in the RIP protocol network segment

R1 routing table look when found, it is formed of two load balancing path, which will lead to forward packets to the router R3 spoofing

Here we verify RIP, the two sides set a password to be the same

After a while we look at the R1 routing table and finds back to normal

We G0 / 0/2 capture, can be found in the bag already clear text passwords

Let us strengthen it, set MD5 authentication, check the routing table and the same simple password

At this time we can not see the password capture

Remember save

Guess you like

Origin www.cnblogs.com/longshisan/p/11966611.html