Netopia 3300-ENT RIP-2 MD5 Authentication, Overview, Authentication configuration, Key management

Models: 3300-ENT

1 302
Download 302 pages 63.93 Kb
Page 158
Image 158

6-10 Firmware User Guide

RIP-2 MD5 Authentication

Firmware version 5.3.7 supports RIP-2 MD5 Authentication (RFC2082 Routing Internet Protocol Version 2, Message Digest 5). The purpose of MD5 authentication is to provide an additional level of confidence that a RIP packet received was generated by a reliable source. In other words, MD5 authentication provides an enhanced level of security that information that your PC receives does not originate from a malicious source posing as part of your network.

Overview

All participants in an authenticated RIP environment on a network must share an identifier key. There is no key exchange protocol like IKE, so all keys must be manually entered by an administrator.

RIP-2 MD5 Authentication requires that an interface configured to receive authenticated packets ignore unau- thenticated packets or packets authenticated with an invalid key. An interface that is not configured for receiving authenticated packets ignores authenticated ones.

On a Netopia router, every interface will be allowed to have up to two keys. RIP-2 MD5 authentication can be configured on the Ethernet LAN (all models), Ethernet WAN models, Connection Profiles, and the Default Profile. Keys can have lifetimes, defined as a start date and time and an end date and time, or infinite.

Key management

Typically, you configure only one key on a given interface and all of the interfaces that interact with that interface. RIP updates are sent every 30 seconds. Each RIP packet is authenticated using one key and sent. When the Netopia router receives an authenticated RIP packet from a device, it keeps track of that device (peer).

The longer it is in use, a single key becomes less secure. Therefore, RFC2082 specifies that an interface must support at least two keys per interface to allow a transition from an old key to a new key. It is recommended that you specify an overlapping time of five minutes for transitioning from one key to the next. Whenever two keys are valid at the same time, the Netopia router tries to determine if other peers (devices that it has received an authenticated packet from in the past three minutes) on its network are using the new key. If any of the peers have not used the new key yet, the Netopia router will send RIP updates twice, once with each key.

If the last valid key expires, the Device Event History logs a “* RIP: last authentication key expired” message, and continues to use that key as if it were still valid.

Authentication configuration

To configure RIP-2 MD5 authentication, from the Main Menu, select System Configuration, then IP Setup.

Main

Menu

System Configuration

IP Setup

The IP Setup screen appears.

Page 158
Image 158
Netopia 3300-ENT manual RIP-2 MD5 Authentication, Overview, Authentication configuration, Key management