• Skip to main content
  • Skip to header right navigation
  • Skip to site footer

Roger Perkin

Learn Network Automation

  • Network Automation
    • Ansible Network Automation
      • Ansible Hosts File
      • What is Ansible?
    • Python Network Automation
      • Python for Network Engineers
    • Python Tutorial for Beginners
    • Terraform
    • pyATS
    • Docker
    • GIT
  • Cisco
    • ISE
    • SD WAN Training
    • Password Recovery
    • Software-Upgrade-Guides
    • BGP
    • Data Center
    • WIRELESS
  • CCIE
  • Blog
  • About
    • My Red Special Guitar
  • COURSES

RIPv2 Authentication

Home » RIP

The Cisco implementation of RIPv2 supports two modes of authentication: plain text  and MD5 authentication.

Plain text authentication is the default setting in every RIPv2 packet, when authentication is enabled.

Plain text authentication should not be used when security is an issue, because the unencrypted authentication password is sent in every RIPv2 packet.

To configure RIPv2 authentication between two routers you need to carry out these steps.

1. Define a key chain with a name

2. Define the key or keys on the chain

3. Specify password or key chain

4. Enable authentication on the interface and specify the key chain to be used

5. Specify if the interface will use plain text or MD5

6. Configure Key Management – This is optional

Example below.

R1(config)#key chain KEYCHAIN1
 R1(config-keychain)#?
 Key-chain configuration commands:
 default  Set a command to its defaults
 exit     Exit from key-chain configuration mode
 key      Configure a key
 no       Negate a command or set its defaults
R1(config-keychain)#key ?
 <0-2147483647>  Key identifier
R1(config-keychain)#key 1
 R1(config-keychain-key)#key-string CISCO123
 R1(config-keychain-key)#end
 R1#
 Jan  5 06:07:50.345: %SYS-5-CONFIG_I: Configured from console by console
 R1#conf t
 Enter configuration commands, one per line.  End with CNTL/Z.
 R1(config)#int fa0/0
 R1(config-if)#ip rip au
 R1(config-if)#ip rip authentication key
 R1(config-if)#ip rip authentication key-chain  KEYCHAIN1
 R1(config-if)#ip rip authentication key-chain  KEYCHAIN1 ?
 LINE    <cr>
R1(config-if)#ip rip authentication ?
 key-chain  Authentication key-chain
 mode       Authentication mode
R1(config-if)#ip rip authentication mode ?
 md5   Keyed message digest
 text  Clear text authentication
R1(config-if)#ip rip authentication mode md5 ?
 <cr>
R1(config-if)#ip rip authentication mode md5
 R1(config-if)#

Now configure the same on the remote end of the link to restore connectivity

Category: RIP
Previous Post: « Where is the BGP Best Path Selection Algorithm
Next Post: OSPF cost calculation »

Sidebar

Hi I'm Roger Perkin,
Based in the UK working as a Technical Architect focussed on Network Automation CCIE #50038
About Roger | Twitter | Linkedin

Recent Posts

  • How to install VMWare tools on Ubuntu 20.04
  • Ansible Tutorial for Beginners with Playbook Example
  • Hashicorp Vault Tutorial
  • Ansible Tower vs Ansible Automation Platform
  • Cisco Certified DevNet Expert Getting Started Guide

Topics

Network Automation
Ansible
Python for Network Automation
CCIE
Cisco ISE
F5 Certification
BGP
OSPF

Git for Network Engineers

Ansible vs Nornir

Start learning today with my Network Automation Courses

Master Ansible, Python, Git, Nornir, Jenkins and more..


Buy me a coffeeBuy me a coffee

ansible training course

Have you seen my YouTube Channel?

YouTube Subscribe

Let’s get started

Take a look at my premium courses on Ansible, Nornir & Git or buy them all with the Network Automation Bundle!

Network Automation Courses

Navigation

Home

Blog

About

Contact

Network Tools

Python VENV Tutorial

Contact

Get in touch with me here

[email protected]

  • Facebook
  • Instagram
  • Twitter
  • LinkedIn
  • YouTube
Buy me a coffeeBuy me a coffee

YouTube

Don’t forget to take a look at my YouTube Channel

youtube button

Tech

Best Vertical Mouse for RSI

Copyright © 2022 · Roger Perkin · All Rights Reserved · Powered by Mai Theme