Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

The above network has RIPv2, OSPF, and EIGRP protocols in Intranet and is connec

ID: 3796494 • Letter: T

Question

The above network has RIPv2, OSPF, and EIGRP protocols in Intranet and is connected to two ISPs thru BGP protocol. As a consultant write a technical proposal to implement the following solutions.

1.Create a multiprotocol operational network using EIGRP, OSPF, and RIPv2 protocol.

2.Implement a secure update of OSPF and EIGRP protocol.

3.Implement virtual link in one segment of the network

please answer in detail with in 150 words for each question

Multiprotocol Network RIP Network Redistribution RIPv2 to OSPF OSPF to RIPv2 EIGRP Network. SPF real OSPF Area 0 Redistribution OSPF to EIGRP EIGRP to OSPF OSPF Area 2 BGP BGP ISP 1 ISP 2

Explanation / Answer

2. Implementation of a secure update of OSPF and EIGRP protocol:

Attacks may target the router devices, the peering sessions or the routing information. Luckily, the protocols like OSPF, EIGRP, BGP and RIPv2 provide the tools to protect the routing communications. This is done by the following methods:

1. Neighbor authentication: This is present on most routing protocols and that ensure a router only receives the dependable routing information from trusted neighbors. That is attained by confirming the validity of each neighbor and the reliability of its routing updates. Generally, each router at first configured with a shared secret key that is used to certify each routing update. Each router is required to sign it with the predefined secret key before sending a routing update and contain the resulting signature as part of the update message. At last, the update is verified by the receiving neighbor to prove its authenticity and integrity.

Neighbor authentication can be configured for the following routing protocols:

There are two types of neighbor authentication used. 1. Plain text authentication and 2.Message Digest Algorithm Version 5 authentication. Both work in the same way, but MD5 sends a message digest which is created using key and message, instead of the authenticating key itself. Plain text authentication sends the authenticating key itself over the wire.

Every neighbor router participating must share an authenticating key which is specified at each router during configuration. Multiple keys can be specified with some protocols and each key must be identified by a key number. When a routing update is sent, the following authentication sequence occurs:

DRP Server Agent, IS-IS, OSPF, RIP version 2 and MD5 authentication are the protocols used by the plain text authentication. MD5 authentication works similarly to plain text authentication, except that the key is never sent over the wire. As an alternative, the router uses MD5 algorithm to produce a message digest of the key. The message digest is then sent instead of the key itself. This ensures that nobody can discover on the line and learn keys during transmission.

OSPF, RIP version 2, BGP, IP Enhanced IGRP are the protocols used by MD5 authentication. The key chains can be configured for the IP routing protocols like RIP version 2, IP Enhanced IGRP and DRP Server Agent. These routing protocols provide an additional function by using key chains. Each key definition within the key chain must specify a time interval for which that key will be activated. Then, during a given key's lifetime, routing update packets are sent with this activated key and cannot be used during time periods for which they are not activated. So, it is suggested that for a given key chain, key activation times overlap to avoid any period of time for which no key is activated. If a time period occurs when no key is activated the neighbor authentication does not takes place and hence the routing updates fails.

3. Implementation of virtual link in one segment of the network:

There are 3 areas and area 0 is on the left side and area 2 is behind area 1. Generally this is not possible because area 2 must be directly connected to area 0. This can be done by using a virtual link. By using a virtual link area 0 can be extended through area 1 so that area 2 will be directly connected to area 0. This is how a virtual link works.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote