Published On Oct 10, 2022
How can two routers change the authentication keys they are using without risking a neighbor adjacency going down? That is handled by Key Rotation.
How can we configure more secure hashing algorithms for OSPF authentication like hmac-sha? That is handled by Key Chains.
Both Keychains and Key Rotation are covered in this lesson.
This is lesson 21 of the Practical OSPF series. The full series is available here:
• Practical OSPF
00:00 - Intro
01:33 - Key Rotation using Key IDs
02:42 - GNS3 Topology Introduction
03:37 - Key Rotation Demo -- Key Rollover in progress
10:06 - What happens on the wire during Key Rollover?
13:14 - MD5 sucks - What is SHA? What is HMAC?
14:44 - What are Key Chains?
16:02 - Keychain Demo - backwards compatible using MD5
20:02 - Keychain Demo - hmac-sha
24:06 - Date Based Key Rollover with Keychains
25:12 - Keychain Key Rollover Configuration Example
26:38 - Keychain Key Rotation Demo
29:59 - Keychain Rollover final thoughts
31:17 - Main Takeaways
#ospf #networking #ccnp
================
To learn more about Hashing Algorithms:
• Hashing, Hashing Algorithms, and Coll...
To learn more about Data Integrity and HMACs:
• Data Integrity - How Hashing is used ...
================
💬 Join us on Discord:
https://pracnet.net/discord
📜 Studying for the CCNA? Check out these free resources:
https://www.practicalnetworking.net/i...
🎯 Full Practical OSPF Series ➡️ pracnet.net/ospf:
• Practical OSPF