01.04.2015 Views

IS-IS and OSPF: Network Design Comparisons and ... - JANOG

IS-IS and OSPF: Network Design Comparisons and ... - JANOG

IS-IS and OSPF: Network Design Comparisons and ... - JANOG

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Security<br />

• Both protocols support authentication<br />

• Plain-text passwords (sniffable!)<br />

• MD5 cryptographic hash<br />

• Authentication especially important with<br />

<strong>OSPF</strong><br />

• Runs over IP, so subject to spoofing <strong>and</strong><br />

other attacks<br />

• Non-IP nature makes <strong>IS</strong>-<strong>IS</strong> inherently<br />

more secure<br />

• But authentication still a good idea

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!