principle
Experimental simulation
Lab topology
Test connectivity
Rip build network
View the routing table
R3 simulated attack first put in his notice of ip network segment
After the configuration check the routing table
You can see the segment has been illegally obtaining information R1R2, then R3 and now we can send a large number of ping packets to two segments, resulting in network congestion, form assault
Next we loopback interface addresses are 192.168.10.254 192.168.20.254, both deceived and notices in the RIP protocol network segment
R1 routing table look when found, it is formed of two load balancing path, which will lead to forward packets to the router R3 spoofing
Here we verify RIP, the two sides set a password to be the same
After a while we look at the R1 routing table and finds back to normal
We G0 / 0/2 capture, can be found in the bag already clear text passwords
Let us strengthen it, set MD5 authentication, check the routing table and the same simple password
At this time we can not see the password capture
Remember save