Главная
Study mode:
on
1
- Intro
2
- Key Rotation using Key IDs
3
- GNS3 Topology Introduction
4
- Key Rotation Demo -- Key Rollover in progress
5
- What happens on the wire during Key Rollover?
6
- MD5 sucks - What is SHA? What is HMAC?
7
- What are Key Chains?
8
- Keychain Demo - backwards compatible using MD5
9
- Keychain Demo - hmac-sha
10
- Date Based Key Rollover with Keychains
11
- Keychain Key Rollover Configuration Example
12
- Keychain Key Rotation Demo
13
- Keychain Rollover final thoughts
14
- Main Takeaways
Description:
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only! Grab it Explore key rotation and keychains in OSPF authentication through this comprehensive video tutorial. Learn how routers can change authentication keys without disrupting neighbor adjacencies, and discover the implementation of more secure hashing algorithms like hmac-sha. Dive into practical demonstrations using GNS3, covering key rollover processes, wire-level changes during rollover, and the advantages of SHA and HMAC over MD5. Gain hands-on experience with keychain configurations, including backwards compatibility with MD5 and implementation of hmac-sha. Master date-based key rollover techniques and understand the key takeaways for effective OSPF authentication management.

Keychains, Key Rotation, and HMAC-SHA Keys for OSPF Authentication - Practical OSPF Lesson 21

Practical Networking
Add to list