Tip

RIP security

Many small networks still use the Routing Information Protocol (RIP), despite the fact that almost every alternative is better at loop prevention, fast convergence and security. Even so, if you're stuck with

    Requires Free Membership to View

RIP, it doesn't mean you can't improve your system's security. Assuming you have a Cisco router and version of IOS released this century, this tip will explain the few easy commands required to prevent people from sending you bogus routes or corrupting your tables.

First, you need to create a key chain if you don't have one already. To create a key chain named "my-key-chain" from the config prompt, type:

key chain my-key-chain

Next, type the number of the key you want to create on the chain. The first key should be key 1. You can set up multiple keys if you have multiple adjacent routers and you want different keys for each, but that's just a management hassle. You can use the same key for all the routers. Type:

key 1

Now, you need the key string, which is the password. Type:

key-string mYpAsSw0rD

You should now have a key chain created. Now to enable the chain for RIP, you need to type the following command from the config interface prompt:

ip rip authentication key-chain my-key-chain

More on this topic
Crash Course: Routers

Crash Course: Advanced routers

Guide to network security

Key chain information from Cisco's Website

This will prevent accidental problems (like a server administrator starting the RIP service and advertising a default route to see what happens) because your router will only accept updates from routers that have the right key configured. However, this is in plain text and won't prevent anyone with malicious intentions from snooping the password and then sending you bad routes with the right password. To stop that sort of deviant behavior, you'll need to type the following:

ip rip authentication mode md5

Instead of sending your password in clear text over the wire, now you'll send an md5 hash of the password. Note that earlier this year, a flaw was found in the md5 algorithm so it's no longer considered "secure," but it's enough to deter most people.

Obviously, you need to type these same commands on each pair of router interfaces in your network. However, the key numbers do not have to be the same. For more information, you can search for key chains on Cisco's Website.

This was first published in September 2005

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.