O'Reilly logo

Designing Network Security Second Edition by Merike Kaeo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 4. Routing Protocol Security

Routing is an essential element in keeping networking infrastructures up and running. Due to the major role that routing protocols play in network infrastructures, this chapter is devoted to detailing some commonly used routing protocols and which built-in functionality exists to effectively secure them (at least to the extent possible today). Most of the mechanisms to provide security have been available for years but have not been widely deployed or are not clearly understood (probably leading to the nondeployment issue). This chapter focuses on most of the routing protocols used in deploying IP routing architectures: RIP, EIGRP, OSPF, IS-IS, and BGP. It is not intended to be a tutorial on routing protocols ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required