The BubbaGump ISP now has a hacker
attacking their open OSPF WAN. You have been called on to password
protect the OSPF routing protocol on their network.
From the "Router A" console
- Turn on authentication and
configure the fastethernet interfaces with an authentication
password by issuing the following commands:
- router-a(config)#router
ospf 1
- router-a(config-router)#area
0 authentication
- router-a(config)#interface
fastethernet 0/0
- router-a(config-if)#ip
ospf authentication-key cisco
- router-a(config-if)#control
Z
- Write the running-configuration to
memory
- Enter show
ip ospf neighbors and
report below the routers listed

- Enter show
ip ospf database
What routers are listed? Why?

From the "Router B" console
- Configure authentication with the
same password on "Router B"
- Enter show
ip ospf neighbor
What routers are listed?

- Enter debug
ip ospf adj and report
your findings below:

- Add the Cisco
authentication key to all the routers in OSPF area 0, write the
running-configurations of all the routers to memory, and reboot
all routers in OSPF area 0.
From the "Router B" console
- Enter enable
exec mode and issue the
command show ip ospf
neighbor
List below the router IDs of the
routers in OSPF area 0