Page 21  

OSPF Route Summarization

2022 June 1

OSPF Route Summarization OSPF route summarization decreases the size of the routing table and optimizes the functioning of the routing protocol. OSPF route summarization can be configured on an Area Border Router (ABR) or an Autonomous System Boundary Router (ASBR) during redistribution. In other words ...

Read more  

OSPF Route Filtering

2022 May 31

OSPF Route Filtering An OSPF filter-list and a distribute-list are two methods to perform route filtering with OSPF. They are most often combined with a prefix-list or a route-map to specify routes or route attributes, such as a tag value. Route filtering in OSPF is configured on an Area Border Router (ABR) or ...

Read more  

Bidirectional Forwarding Detection

2022 May 25

Bidirectional Forwarding Detection Bidirectional Forwarding Detection (BFD) is the name of a protocol aimed at reducing network failure detection times. BFD is faster at detecting link failures than a traditional routing protocol keepalive mechanism, such as the Hello protocol. A BFD neighborship is explicitly configured between ...

Read more  

GETVPN with MPLS L3VPN

2022 May 24

GETVPN with MPLS L3VPN GETVPN enables traffic encryption between subscriber locations through a tunnel-less VPN architecture. The GDOI is an essential part of GETVPN because it defines the function of a Key Server and its Group Members. GETVPN can secure a variety of Layer-3 technologies without relying on point-to-point tunnel ...

Read more  

OSPF Authentication

2022 May 23

Unicast Reverse Path Forwarding Routing protocol security is an integral part of a network. To ensure that only authorized routing protocol updates are received, OSPF neighborships can be authenticated. This means, an OSPF neighborship only forms if the pre-shared key matches between two routers. There are multiple methods ...

Read more  

Unicast Reverse Path Forwarding

2022 May 18

Unicast Reverse Path Forwarding uRPF protects a network against a specific type of IP spoofing attack. An external malicious actor can modify the source IP address of packets to make them seemingly originate from within a network. Upon receiving these malicious packets that have modified (spoofed) IP addresses ...

Read more  

Network Address Translation (NAT)

2022 May 13

Network Address Translation NAT Network address translation (NAT) allows a private network to access public IP addresses. NAT enables a public (outside) IP address to represent one or more local (inside) addresses. This means that an outside address communicates on behalf of several inside addresses due to ...

Read more  

Proxy ARP

2022 May 12

Proxy ARP Proxy ARP is performed by a network device that inserts its own MAC address in response to ARP broadcast packets, and does so on behalf of another host in the network. A router receiving a broadcast ARP request packet could locate the destination IP address on a connected interface ...

Read more