Enabling RIP Authentication
Problem
You want to authenticate your RIP traffic to ensure that unauthorized equipment cannot affect how traffic is routed through your network.
Solution
The following set of commands enables plain-text RIP authentication:
Router1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z. Router1(config)#key chain
Router1(config-keychain)#
ORA
key
Router1(config-keychain-key)#
1
key-string
Router1(config-keychain-key)#
oreilly
exit
Router1(config)#interface
Router1(config-subif)#
FastEthernet0/0.1
ip rip authentication key-chain
Router1(config-subif)#
ORA
ip rip authentication mode text
Router1(config-subif)#exit
Router1(config)#end
Router1#
For greater security, Cisco routers can also use MD5-based authentication:
Router1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z. Router1(config)#key chain
Router1(config-keychain)#
ORA
key
Router1(config-keychain-key)#
1
key-string
Router1(config-keychain-key)#
oreilly
exit
Router1(config)#interface
Router1(config-subif)#
FastEthernet0/0.1
ip rip authentication key-chain
Router1(config-subif)#
ORA
ip rip authentication mode md5
Router1(config-subif)#end
Router1#
Discussion
RIP authentication is one of the protocol enhancements that appeared in Version 2. It is not available for Version 1.
The first configuration example in this recipe uses plain-text authentication. In general, we recommend using the MD5 authentication because the plain-text version is far too easy to break. ...
Get Cisco IOS Cookbook, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.