Keychains, Key Rotation, and HMAC-SHA Keys for OSPF Authentication - Practical OSPF Lesson 21
Offered By: Practical Networking via YouTube
Course Description
Overview
Explore key rotation and keychains in OSPF authentication through this comprehensive video tutorial. Learn how routers can change authentication keys without disrupting neighbor adjacencies, and discover the implementation of more secure hashing algorithms like hmac-sha. Dive into practical demonstrations using GNS3, covering key rollover processes, wire-level changes during rollover, and the advantages of SHA and HMAC over MD5. Gain hands-on experience with keychain configurations, including backwards compatibility with MD5 and implementation of hmac-sha. Master date-based key rollover techniques and understand the key takeaways for effective OSPF authentication management.
Syllabus
- Intro
- Key Rotation using Key IDs
- GNS3 Topology Introduction
- Key Rotation Demo -- Key Rollover in progress
- What happens on the wire during Key Rollover?
- MD5 sucks - What is SHA? What is HMAC?
- What are Key Chains?
- Keychain Demo - backwards compatible using MD5
- Keychain Demo - hmac-sha
- Date Based Key Rollover with Keychains
- Keychain Key Rollover Configuration Example
- Keychain Key Rotation Demo
- Keychain Rollover final thoughts
- Main Takeaways
Taught by
Practical Networking
Related Courses
Writing Professional Email and Memos (Project-Centered Course)University System of Georgia via Coursera Cisco NEW CCNA R/S (200-125): The Complete Course
Udemy Wireshark: Packet Analysis and Ethical Hacking: Core Skills
Udemy Cisco CCNA: The A, B, C's of IPv6
Udemy Routing Protocols Fundamentals using Cisco Packet Tracer
Coursera Project Network via Coursera