Configuring Secure OSPF with Authentication
The "Configuring Secure OSPF with Authentication" module provides you with the instructions and Cisco hardware to develop your hands on skills in examining OSPF security threats and configuring OSPF to mitigate these threats. In this module you will perform the following exercises: Examine the initial OSPF configuration, Examine and...
Already have an account? Sign In »

Introduction
The Configuring Secure OSPF with Authentication module provides you with the instructions and Cisco hardware to develop your hands on skills in examining OSPF security threats and configuring OSPF to mitigate these threats.
In this module you will perform the following exercises:
- Examine the initial OSPF configuration
- Examine and understand OSPF security vulnerabilities
- Configure OSPF with authentication
Exercise 1 - Examine the Initial OSPF Configuration
In this exercise, you will examine a single area OSPF configuration that uses no security features. You will see the details of its configuration in order to understand the security threats that exist and the methods of mitigating those threats in the exercises that follow.
Exercise 2 - Examine and Understand OSPF Security Vulnerabilities
If not properly secured, OSPF can be vulnerable to attacks that will have adverse effects on network performance. An attacker using a computer on the network can masquerade as a router and can send incorrect routing updates to other routers on the network.
Exercise 3 - Configure OSPF with Authentication
In this exercise, you will learn how to authenticate your OSPF neighbors using both MD5 and clear text authentication methods. Specifically, you will configure the legitimate OSPF network devices to use authentication in order to prevent the attacker from gaining access to OSPF on the network.
Organizations are becoming increasingly security conscious and aware, and authenticating routing protocols are slowly becoming the norm. In areas where security is of major concern, for example in a DMZ or on connections to third parties, authenticating routing becomes even more important.
See the full benefits of our immersive learning experience with interactive courses and guided career paths.