当前位置:网站首页>Rip notes [rip message security authentication, increase of rip interface measurement]
Rip notes [rip message security authentication, increase of rip interface measurement]
2022-07-05 04:47:00 【Purer than pure passers-by】
Catalog
RIP Message security authentication [ The experimental diagram is as follows ]
rip Increase in interface metrics
RIP Message security authentication [ The experimental diagram is as follows ]
Basic configuration
First, complete the interface ip To configure [R3 It simulates the spam message of the attacker , These messages are a burden for the link, including equipment , but rip However, it is impossible to identify whether these messages are garbage messages, so it is impossible to intercept them , For these garbage messages rip Other devices in the will still be loaded into the routing table . It's not hard to imagine if R3 The garbage message of is generated in batch , Its impact on the whole network ]:
R1:
[Huawei]interface GigabitEthernet 0/0/0
[Huawei-GigabitEthernet0/0/0]ip address 192.168.1.1 24
[Huawei-GigabitEthernet0/0/0]q
[Huawei]interface LoopBack 0
[Huawei-LoopBack0]ip address 1.1.1.1 24
[Huawei]rip
[Huawei-rip-1]network 192.168.1.0
[Huawei-rip-1]network 1.0.0.0
R2
[Huawei]interface GigabitEthernet 0/0/0
[Huawei-GigabitEthernet0/0/0]ip address 192.168.1.2 24
[Huawei-GigabitEthernet0/0/0]q
[Huawei]interface LoopBack 0
[Huawei-LoopBack0]ip address 2.2.2.2 24
[Huawei-LoopBack0]q
[Huawei]rip
[Huawei-rip-1]version 2
[Huawei-rip-1]network 192.168.1.0
[Huawei-rip-1]network 2.0.0.0
R3
[Huawei]interface GigabitEthernet 0/0/0
[Huawei-GigabitEthernet0/0/0]ip address 192.168.1.3 24
[Huawei-GigabitEthernet0/0/0]q
[Huawei]interface LoopBack 0
[Huawei-LoopBack0]ip address 3.3.3.3 24
[Huawei-LoopBack0]q
[Huawei]interface LoopBack 1
[Huawei-LoopBack1]ip address 4.4.4.4 24
[Huawei-LoopBack1]q
[Huawei]interface LoopBack 2
[Huawei-LoopBack2]ip address 5.5.5.5 24
[Huawei-LoopBack2]q
[Huawei]rip
[Huawei-rip-1]version 2
[Huawei-rip-1]network 192.168.1.0
[Huawei-rip-1]network 3.0.0.0
[Huawei-rip-1]network 4.0.0.0
[Huawei-rip-1]network 5.0.0.0
Now the basic configuration has been completed , see R1 The routing table of verifies whether the above idea is accurate , You can see R1 There is R3 All garbage messages , This is undoubtedly a burden for the equipment .
RIP authentication
R1【 among simple It is the authentication method of the message : Plaintext Authentication ; That is, the authentication password is clear text in message transmission , Verification diagram 1-5;
plain It means that the configuration file is in clear text , It can be done by dis th View the configuration information to get password information , Verification diagram 1-6】
[Huawei]interface GigabitEthernet 0/0/0
[Huawei-GigabitEthernet0/0/0]rip authentication-mode simple plain 123
chart 1-5【Src: primary ip Address ;Authentication: authentication ;Password: password 】
chart 1-6[ It can be seen that the configuration is clear text and will plain Switch to cipher It turns the configuration file into ciphertext ]
Now let's look at R2 The routing table for , According to the above idea, now R2 The routing table cannot be viewed 1.1.1.0/24 Of :
Sure enough R1 Of 1.1.1.0/24 Not in R2 In the routing table of , So just for R2 Also on the configuration RIP Verification is enough :
R2:
[Huawei]interface GigabitEthernet 0/0/0
[Huawei-GigabitEthernet0/0/0]rip authentication-mode simple plain 123
Now look at R2 The routing table for 【 You can see R2 There's no more R3 Garbage message 】
rip Increase in interface metrics
【 Use the above experiment to complete , here R2 On the routing table 1.1.1.0/24 The measure of is 1】
R2:
matching 1.1.1.0/24 The routing entry for :
[Huawei]acl 2000
[Huawei-acl-basic-2000]rule 5 permit source 1.1.1.0 0.0.0.255
[Huawei-acl-basic-2000]q
Configuration code , by 1.1.1.0/24 Routing increases 1 Measures
[Huawei]interface g0/0/0
[Huawei-GigabitEthernet0/0/0]rip metricin 2000 2
see R1 The routing table for 【 You can see 1.0.0.0/24 The measure of the entry has become 3】:
边栏推荐
- A survey of automatic speech recognition (ASR) research
- 2021 Higher Education Club Cup mathematical modeling national tournament ABCD problem - problem solving ideas
- 10 programming habits that web developers should develop
- PHP读取ini文件并修改内容写入
- CSDN body auto generate directory
- Live broadcast preview | container service ack elasticity prediction best practice
- Introduction to RT thread kernel (4) -- clock management
- Discussion on the dimension of confrontation subspace
- 【科普】热设计基础知识:5G光器件之散热分析
- C26451: arithmetic overflow: use the operator * on a 4-byte value, and then convert the result to an 8-byte value. To avoid overflow, cast the value to wide type before calling the operator * (io.2)
猜你喜欢
随机推荐
How to carry out "small step reconstruction"?
How should programmers learn mathematics
Function overloading
Burpsuite grabs app packets
直播預告 | 容器服務 ACK 彈性預測最佳實踐
直播预告 | 容器服务 ACK 弹性预测最佳实践
Manually implement heap sorting -838 Heap sort
Introduce Hamming distance and calculation examples
History of web page requests
Looking at Chinese science and technology from the Winter Olympics: what is the mystery of the high-speed camera that the whole people thank?
level17
3 minutes learn to create Google account and email detailed tutorial!
Reading and visualization of DICOM, MHD and raw files in medical imaging
电源管理总线 (PMBus)
SQL set operation
Official announcement! The third cloud native programming challenge is officially launched!
Introduction to RT thread kernel (4) -- clock management
Qt蓝牙:搜索蓝牙设备的类——QBluetoothDeviceDiscoveryAgent
Hypothesis testing -- learning notes of Chapter 8 of probability theory and mathematical statistics
Decryption function calculates "task state and lifecycle management" of asynchronous task capability