Keychains / Key Rotation / hmac-sha keys - OSPF Authentication - Practical OSPF
Practical Networking Practical Networking
237K subscribers
5,872 views
0

 Published On Oct 10, 2022

How can two routers change the authentication keys they are using without risking a neighbor adjacency going down? That is handled by Key Rotation.

How can we configure more secure hashing algorithms for OSPF authentication like hmac-sha? That is handled by Key Chains.

Both Keychains and Key Rotation are covered in this lesson.

This is lesson 21 of the Practical OSPF series. The full series is available here:
   • Practical OSPF  

00:00 - Intro
01:33 - Key Rotation using Key IDs
02:42 - GNS3 Topology Introduction
03:37 - Key Rotation Demo -- Key Rollover in progress
10:06 - What happens on the wire during Key Rollover?
13:14 - MD5 sucks - What is SHA? What is HMAC?
14:44 - What are Key Chains?
16:02 - Keychain Demo - backwards compatible using MD5
20:02 - Keychain Demo - hmac-sha
24:06 - Date Based Key Rollover with Keychains
25:12 - Keychain Key Rollover Configuration Example
26:38 - Keychain Key Rotation Demo
29:59 - Keychain Rollover final thoughts
31:17 - Main Takeaways


#ospf #networking #ccnp
================

To learn more about Hashing Algorithms:
   • Hashing, Hashing Algorithms, and Coll...  

To learn more about Data Integrity and HMACs:
   • Data Integrity - How Hashing is used ...  

================

💬 Join us on Discord:
https://pracnet.net/discord

📜 Studying for the CCNA? Check out these free resources:
https://www.practicalnetworking.net/i...

🎯 Full Practical OSPF Series ➡️ pracnet.net/ospf:
   • Practical OSPF  

show more

Share/Embed