设为首页 收藏本站
查看: 1305|回复: 0

[经验分享] Cisco RIPv2 认证和触发更新

[复制链接]

尚未签到

发表于 2018-7-20 13:11:21 | 显示全部楼层 |阅读模式
  1.实验目的
  通过本实验可以掌握:
  (1)RIPv2明文认证的配置和匹配原则
  (2)RIPv2 MD5 认证的配置和匹配原则
  (3)RIPv2触发更新
  2.拓扑结构

  实验拓扑如图 4-1 所示。
  3.实验步骤
  (1)步骤 1:配置路由器 R1
  R1(config)#key chain test //配置钥匙链

  R1(config-keychain)#key 1 //配置KEY>
  R1(config-keychain-key)#key-string cisco //配置 KEY>  R1(config)#interface s0/0/0
  R1(config-if)#ip rip authentication mode text
  //启用认证,认证模式为明文,默认认证模式就是明文,所以也可以不用指定
  R1(config-if)#ip rip authentication key-chain test //在接口上调用钥匙链
  R1(config-if)#ip rip triggered //在接口上启用触发更新
  (2)步骤 2:配置路由器 R2
  R2(config)#key chain test
  R2(config-keychain)#key 1
  R2(config-keychain-key)#key-string cisco
  R2(config)#interface s0/0/0
  R2(config-if)#ip rip triggered
  R2(config-if)#ip rip authentication key-chain test
  R2(config-if)#interface s0/0/1
  R2(config-if)#ip rip authentication key-chain test
  R2(config-if)#ip rip triggered
  (3)步骤 3:配置路由器 R3
  R3(config)#key chain test
  R3(config-keychain)#key 1
  R3(config-keychain-key)#key-string cisco
  R3(config)#interface s0/0/0
  R3(config-if)#ip rip authentication key-chain test
  R3(config-if)#ip rip triggered
  R3(config-if)#interface s0/0/1
  R3(config-if)#ip rip authentication key-chain test
  R3(config-if)#ip rip triggered
  (4)步骤 4:配置路由器 R4
  R4(config)#key chain test
  R4(config-keychain)#key 1
  R4(config-keychain-key)#key-string cisco
  R4(config)#interface s0/0/0
  R4(config-if)#ip rip authentication key-chain test
  R4(config-if)#ip rip triggered 4.实验调试
  (1)show ip protocols
  R2#show ip protocols
  Routing Protocol is "rip"
  Outgoing update filter list for all interfaces is not set
  Incoming update filter list for all interfaces is not set
  Sending updates every 30 seconds, next due in 4 seconds
  Invalid after 180 seconds, hold down 0, flushed after 240
  // 由于触发更新,hold down计时器自动为0
  Redistributing: rip
  Default version control: send version 2, receive version 2
  Interface Send Recv Triggered RIP Key-chain
  Serial0/0/0 2 2 Yes test
  Serial0/0/1 2 2 Yes test
  //以上两行表明s0/0/0和s0/0/1接口启用了认证和触发更新
  Automatic network summarization is not in effect
  Maximum path: 4
  Routing for Networks:
  192.168.12.0
  192.168.23.0
  Routing Information Sources:
  Gateway Distance Last Update
  192.168.12.1 120 00:26:10
  192.168.23.3 120 00:26:01
  Distance: (default is 120)
  (2)debug ip rip
  R2#debug ip rip
  RIP protocol debugging is on
  R2#clear ip route *
  *Feb 11 13:51:31.827: RIP: sending triggered request on Serial0/0/0 to  224.0.0.9
  *Feb 11 13:51:31.831: RIP: sending triggered request on Serial0/0/1 to  224.0.0.9
  *Feb 11 13:51:31.843: RIP: sending triggered request on Serial0/0/0 to  224.0.0.9
  *Feb 11 13:51:31.847: RIP: sending triggered request on Serial0/0/1 to  224.0.0.9
  *Feb 11 13:51:31.847: RIP: send v2 triggered flush update to  192.168.12.1 on Serial0/0/0 with
  no route
  *Feb 11 13:51:31.851: RIP: start retransmit timer of 192.168.12.1
  *Feb 11 13:51:31.855: RIP: send v2 triggered flush update to  192.168.23.3 on Serial0/0/1 with
  no route
  *Feb 11 13:51:31.855: RIP: start retransmit timer of 192.168.23.3
  *Feb 11 13:51:32.019: RIP: received packet with text authentication  cisco
  *Feb 11 13:51:32.019: RIP: received v2 triggered update from  192.168.12.1 on Serial0/0/0
  *Feb 11 13:51:32.023: RIP: sending v2 ack to 192.168.12.1 via  Serial0/0/0 (192.168.12.2),
  flush, seq# 1
  *Feb 11 13:51:32.027: 1.1.1.0/24 via 0.0.0.0 in 1 hops *Feb 11   13:51:32.031: RIP: received packet with text authentication cisco
  *Feb 11 13:51:32.035: RIP: received v2 triggered update from  192.168.23.3 on Serial0/0/1
  *Feb 11 13:51:32.035: RIP: sending v2 ack to 192.168.23.3 via  Serial0/0/1(192.168.23.2),
  flush, seq# 2
  *Feb 11 13:51:32.039: 192.168.34.0/24 via 0.0.0.0 in 1 hops
  *Feb 11 13:51:32.043: 4.4.4.0/24 via 0.0.0.0 in 2 hops
  *Feb 11 13:51:32.071: RIP: received packet with text authentication  cisco
  *Feb 11 13:51:32.071: RIP: received v2 triggered update from  192.168.23.3 on Serial0/0/1
  *Feb 11 13:51:32.071: RIP: sending v2 ack to 192.168.23.3 via  Serial0/0/1(192.168.23.2),
  flush, seq# 3
  *Feb 11 13:51:32.075: 192.168.34.0/24 via 0.0.0.0 in 1 hops
  *Feb 11 13:51:32.079: 4.4.4.0/24 via 0.0.0.0 in 2 hops
  *Feb 11 13:51:32.083: RIP: received packet with text authentication  cisco
  *Feb 11 13:51:32.083: RIP: received v2 triggered ack from 192.168.23.3  on Serial0/0/1
  flush seq# 2
  *Feb 11 13:51:32.087: RIP: send v2 triggered update to 192.168.23.3 on  Serial0/0/1
  *Feb 11 13:51:32.087: RIP: build update entries
  *Feb 11 13:51:32.091: route 176: 192.168.12.0/24 metric 1, tag 0
  *Feb 11 13:51:32.091: route 181: 1.1.1.0/24 metric 2, tag 0
  *Feb 11 13:51:32.095: RIP: Update contains 2 routes, start 176, end 188
  *Feb 11 13:51:32.095: RIP: start retransmit timer of 192.168.23.3
  *Feb 11 13:51:32.099: RIP: received packet with text authentication  cisco
  *Feb 11 13:51:32.099: RIP: received v2 triggered update from  192.168.12.1 on Serial0/0/0
  *Feb 11 13:51:32.103: RIP: sending v2 ack to 192.168.12.1 via  Serial0/0/0 (192.168.12.2),
  flush, seq# 2
  *Feb 11 13:51:32.107: 1.1.1.0/24 via 0.0.0.0 in 1 hops
  *Feb 11 13:51:32.107: RIP: received packet with text authentication  cisco
  *Feb 11 13:51:32.111: RIP: received v2 triggered ack from 192.168.12.1  on Serial0/0/0
  flush seq# 3
  *Feb 11 13:51:32.111: RIP: send v2 triggered update to 192.168.12.1 on  Serial0/0/0
  *Feb 11 13:51:32.115: RIP: build update entries
  *Feb 11 13:51:32.115: route 178: 192.168.23.0/24 metric 1, tag 0
  *Feb 11 13:51:32.119: route 184: 192.168.34.0/24 metric 2, tag 0
  *Feb 11 13:51:32.123: route 187: 4.4.4.0/24 metric 3, tag 0
  *Feb 11 13:51:32.123: RIP: Update contains 3 routes, start 178, end 188
  *Feb 11 13:51:32.123: RIP: start retransmit timer of 192.168.12.1
  *Feb 11 13:51:32.263: RIP: received packet with text authentication  cisco
  *Feb 11 13:51:32.263: RIP: received v2 triggered ack from 192.168.23.3  on Serial0/0/1
  seq# 3
  *Feb 11 13:51:32.267: RIP: received packet with text authentication  cisco
  *Feb 11 13:51:32.271: RIP: received v2 triggered ack from 192.168.12.1  on Serial0/0/0
  seq# 4
  从上面的输出可以看出,在路由器 R2 上,虽然我们打开了 debug ip rip,但是由于采
  用触发更新,所以并没有看到每 30  秒更新一次的信息,而是清除了路由表这件事件触发了路由更新。而且所有的更新中都有“triggered”的字样,同时在接收的更新中带有“text
  authentication”的字样,证明接口 s0/0/0 和s0/0/1 启用了触发更新和明文认证。
  (3)show ip rip database
  该命令可以查看 RIP 数据库。
  R2#show ip rip database
  1.0.0.0/8 auto-summary
  1.1.1.0/24
  [1] via 192.168.12.1, 00:12:22 (permanent), Serial0/0/0
  * Triggered Routes:
  - [1] via 192.168.12.1, Serial0/0/0
  4.0.0.0/8 auto-summary
  4.4.4.0/24
  [2] via 192.168.23.3, 00:12:22 (permanent), Serial0/0/1
  * Triggered Routes:
  - [2] via 192.168.23.3, Serial0/0/1
  192.168.12.0/24 auto-summary
  192.168.12.0/24 directly connected, Serial0/0/0
  192.168.23.0/24 auto-summary
  192.168.23.0/24 directly connected, Serial0/0/1
  192.168.34.0/24 auto-summary
  192.168.34.0/24
  [1] via 192.168.23.3, 00:12:22 (permanent), Serial0/0/1
  * Triggered Routes:
  - [1] via 192.168.23.3, Serial0/0/1
  以上输出进一步说明了在 s0/0/0 和s0/0/1 启用了触发更新。
  (4)show run
  R2#show run | begin router rip
  router rip
  version 2
  timers basic 30 180 0 240
  //由于触发更新,在配置中自动加入上面一行,且hold down计时器被设置为0
  network 192.168.12.0
  network 192.168.23.0
  no auto-summary
  关于 MD5 认证,只需要在接口下声明认证模式为 MD5 即可,例如在 R1上的配置如下:
  R1(config)#key chain test //定义钥匙链
  R1(config-keychain)#key 1
  R1(config-keychain-key)#key-string cisco
  R1(config)#interface s0/0/0
  R1(config-if)#ip rip authentication mode md5 //认证模式为 MD5
  R1(config-if)#ip rip authentication key-chain test
  其他的配置和明文认证相同,这里不再赘述。当在 R2 上执行“debug ip rip”时显示类似如下的信息:
  *Feb 11 14:04:36.851: RIP: sending triggered request on Serial0/0/0 to  224.0.0.9
  *Feb 11 14:04:36.855: RIP: sending triggered request on Serial0/0/1 to  224.0.0.9
  *Feb 11 14:04:36.867: RIP: sending triggered request on Serial0/0/0 to  224.0.0.9
  *Feb 11 14:04:36.871: RIP: sending triggered request on Serial0/0/1 to  224.0.0.9
  *Feb 11 14:04:36.871: RIP: send v2 triggered flush update to  192.168.12.1 on Serial0/0/0 with
  no route
  *Feb 11 14:04:36.875: RIP: start retransmit timer of 192.168.12.1
  *Feb 11 14:04:36.875: RIP: send v2 triggered flush update to  192.168.23.3 on Serial0/0/1 with
  no route
  *Feb 11 14:04:36.879: RIP: start retransmit timer of 192.168.23.3
  *Feb 11 14:04:36.927: RIP: received packet with MD5 authentication
  *Feb 11 14:04:36.931: RIP: received v2 triggered update from  192.168.23.3 on Serial0/0/1
  *Feb 11 14:04:36.931: RIP: sending v2 ack to 192.168.23.3 via  Serial0/0/1 (192.168.23.2),
  flush, seq# 4
  *Feb 11 14:04:36.935: 192.168.34.0/24 via 0.0.0.0 in 1 hops
  *Feb 11 14:04:36.943: 4.4.4.0/24 via 0.0.0.0 in 2 hops
  *Feb 11 14:04:36.947: RIP: received packet with MD5 authentication
  *Feb 11 14:04:36.947: RIP: received v2 triggered update from  192.168.12.1 on Serial0/0/0
  *Feb 11 14:04:36.951: RIP: sending v2 ack to 192.168.12.1 via  Serial0/0/0 (192.168.12.2),
  flush, seq# 3
  *Feb 11 14:04:36.955: 1.1.1.0/24 via 0.0.0.0 in 1 hops
  *Feb 11 14:04:36.959: RIP: received packet with MD5 authentication
  *Feb 11 14:04:36.959: RIP: received v2 triggered update from  192.168.12.1 on Serial0/0/0
  *Feb 11 14:04:36.963: RIP: sending v2 ack to 192.168.12.1 via  Serial0/0/0 (192.168.12.2),
  flush, seq# 4
  *Feb 11 14:04:36.967: 1.1.1.0/24 via 0.0.0.0 in 1 hops
  *Feb 11 14:04:36.967: RIP: received packet with MD5 authentication
  *Feb 11 14:04:36.971: RIP: received v2 triggered ack from 192.168.12.1  on Serial0/0/0
  flush seq# 5
  *Feb 11 14:04:36.971: RIP: send v2 triggered update to 192.168.12.1 on  Serial0/0/0
  *Feb 11 14:04:36.975: RIP: build update entries
  *Feb 11 14:04:36.975: route 191: 192.168.23.0/24 metric 1, tag 0
  *Feb 11 14:04:36.979: route 194: 192.168.34.0/24 metric 2, tag 0
  *Feb 11 14:04:36.979: route 197: 4.4.4.0/24 metric 3, tag 0
  *Feb 11 14:04:36.983: RIP: Update contains 3 routes, start 191, end 201
  *Feb 11 14:04:36.983: RIP: start retransmit timer of 192.168.12.1
  *Feb 11 14:04:36.991: RIP: received packet with MD5 authentication
  *Feb 11 14:04:36.991: RIP: received v2 triggered update from  192.168.23.3 on Serial0/0/1
  *Feb 11 14:04:36.991: RIP: sending v2 ack to 192.168.23.3 via  Serial0/0/1 (192.168.23.2),
  flush, seq# 5
  *Feb 11 14:04:36.999: 192.168.34.0/24 via 0.0.0.0 in 1 hops
  *Feb 11 14:04:36.999: 4.4.4.0/24 via 0.0.0.0 in 2 hops
  *Feb 11 14:04:37.003: RIP: received packet with MD5 authentication *Feb   11 14:04:37.003: RIP: received v2 triggered ack from 192.168.23.3 on   Serial0/0/1
  flush seq# 4
  *Feb 11 14:04:37.007: RIP: send v2 triggered update to 192.168.23.3 on  Serial0/0/1
  *Feb 11 14:04:37.007: RIP: build update entries
  *Feb 11 14:04:37.011: route 189: 192.168.12.0/24 metric 1, tag 0
  *Feb 11 14:04:37.015: route 200: 1.1.1.0/24 metric 2, tag 0
  *Feb 11 14:04:37.015: RIP: Update contains 2 routes, start 189, end 201
  *Feb 11 14:04:37.019: RIP: start retransmit timer of 192.168.23.3
  *Feb 11 14:04:37.059: RIP: received packet with MD5 authentication
  *Feb 11 14:04:37.059: RIP: received v2 triggered ack from 192.168.12.1  on Serial0/0/0
  seq# 6
  *Feb 11 14:04:37.067: RIP: received packet with MD5 authentication
  *Feb 11 14:04:37.071: RIP: received v2 triggered ack from 192.168.23.3  on Serial0/0/1
  seq# 5
  以上输出信息表明采用了 MD5 认证和触发更新。
  【技术要点】
  (1)在以太网接口下,不支持触发更新;
  (2)触发更新需要协商,链路的两端都需要配置;

  (3)在认证的过程中,如果定义多个 key>  样的:
  ① 明文认证的匹配原则是:

  A. 发送方发送最小Key>
  B. 不携带Key>  C. 接收方会和所有 Key Chain 中的密钥匹配,如果匹配成功,则通过认证。
  【实例 1】

  路由器R1 有一个Key>
  路由器R2 有两个Key>  根据上面的原则,R1 认证失败,R2 认证成功,所以在 RIP 中,出现单边路由并不
  稀奇。
  ② MD5 认证的匹配原则是:

  A. 发送方发送最小Key>
  B. 携带Key>
  C. 接收方首先会查找是否有相同的Key>
  成功。如果没有该Key>  【实例 2】

  路由器R1 有三个Key>
  路由器R2 有一个Key>  根据上面的原则,R1 认证失败,R2 认证成功

运维网声明 1、欢迎大家加入本站运维交流群:群②:261659950 群⑤:202807635 群⑦870801961 群⑧679858003
2、本站所有主题由该帖子作者发表,该帖子作者与运维网享有帖子相关版权
3、所有作品的著作权均归原作者享有,请您和我们一样尊重他人的著作权等合法权益。如果您对作品感到满意,请购买正版
4、禁止制作、复制、发布和传播具有反动、淫秽、色情、暴力、凶杀等内容的信息,一经发现立即删除。若您因此触犯法律,一切后果自负,我们对此不承担任何责任
5、所有资源均系网友上传或者通过网络收集,我们仅提供一个展示、介绍、观摩学习的平台,我们不对其内容的准确性、可靠性、正当性、安全性、合法性等负责,亦不承担任何法律责任
6、所有作品仅供您个人学习、研究或欣赏,不得用于商业或者其他用途,否则,一切后果均由您自己承担,我们对此不承担任何法律责任
7、如涉及侵犯版权等问题,请您及时通知我们,我们将立即采取措施予以解决
8、联系人Email:admin@iyunv.com 网址:www.yunweiku.com

所有资源均系网友上传或者通过网络收集,我们仅提供一个展示、介绍、观摩学习的平台,我们不对其承担任何法律责任,如涉及侵犯版权等问题,请您及时通知我们,我们将立即处理,联系人Email:kefu@iyunv.com,QQ:1061981298 本贴地址:https://www.yunweiku.com/thread-539237-1-1.html 上篇帖子: cisco设备配置时间日期的方法。 下篇帖子: Cisco IOS line模式下login的含义
您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

扫码加入运维网微信交流群X

扫码加入运维网微信交流群

扫描二维码加入运维网微信交流群,最新一手资源尽在官方微信交流群!快快加入我们吧...

扫描微信二维码查看详情

客服E-mail:kefu@iyunv.com 客服QQ:1061981298


QQ群⑦:运维网交流群⑦ QQ群⑧:运维网交流群⑧ k8s群:运维网kubernetes交流群


提醒:禁止发布任何违反国家法律、法规的言论与图片等内容;本站内容均来自个人观点与网络等信息,非本站认同之观点.


本站大部分资源是网友从网上搜集分享而来,其版权均归原作者及其网站所有,我们尊重他人的合法权益,如有内容侵犯您的合法权益,请及时与我们联系进行核实删除!



合作伙伴: 青云cloud

快速回复 返回顶部 返回列表