Experimental authentication ciphertext plaintext rip

A closer look at the topology configured ip

Here Insert Picture Description

Created on R1:

 key chain libai   // 创建钥匙链	 libai 是名只有本地意义
 key 10             //   10 编号 
 key-string  cisco   //   密钥 
  两台路由器之间要密钥才能认证成功  
  相同的密钥就是 key id  和 key string相同。

Here Insert Picture Description

调用认证:
int e0/2
ip rip authentication key-chain libai
ip rip authentication mode text

Created on R2:

Here Insert Picture Description

 key chain libai   // 创建钥匙链	 libai 是名只有本地意义
 key 10             //   10 编号 
 key-string  cisco   //   密钥 
  两台路由器之间要密钥才能认证成功  
  相同的密钥就是 key id  和 key string相同。
调用认证:
int e0/1
ip rip authentication key-chain libai
ip rip authentication mode text

When the key chain contains more than the key, based on numbers from small to large and sorting. You will always send the smallest key.
And the key chain in each key can be configured with two parameters is a send-lifetime send cycle
accept-lifetime match for what to do when

R1 and R3 do ciphertext only need to change the mode md5, learn to do it yourself. I do not understand there may be private. study together.

Published 15 original articles · won praise 6 · views 265

Guess you like

Origin blog.csdn.net/weixin_45821358/article/details/104695585