Course Details

Previous Page

Cisco ROUTE 2.0: Routers and Routing Protocol Hardening

Target Audience
Expected Duration
Lesson Objectives
Course Number

This course consists of two parts. The first part explains how to secure Cisco routers using recommended practices. The second part explains the benefits of routing protocol authentication and shows how to configure routing authentication for different routing protocols. It is important to be aware that router security is critical to network security. This course lists recommended steps for securing a Cisco router. This course then focuses on configuring authentication for the routing protocols: EIGRP, OSPF, and BGP. You can prevent your router from receiving false route updates by configuring routing protocol authentication. Authentication options are examined before going into configuration of authentication options for each routing protocol.

Target Audience
Anyone wishing to obtain real-world routing knowledge, and those that are considering CCNP and CCIP certification. This learning path's discussion of routing could also benefit early CCIE Routing and Switching candidates. Students completing the ROUTE 2.0 learning path should have a solid foundation in routing fundamentals, Cisco IOS basics, and Cisco routing basics. Attending the ICND1 and ICND2 classes or having the CCNA certification will fulfill these expectations.


Expected Duration (hours)

Lesson Objectives

Cisco ROUTE 2.0: Routers and Routing Protocol Hardening

  • start the course
  • describe tasks to secure Cisco routers
  • recognize what a router security policy should define
  • secure your vty, console lines, and access to the privileged mode with encrypted passwords
  • configure the router to use only SSH
  • use an ACL to restrict access to a Cisco router
  • secure SNMP
  • back up configuration files
  • describe the importance of implementing network monitoring tools, such as SNMP, syslog, and NetFlow
  • describe the need to disable unused network services
  • describe neighbor authentication options
  • describe time-based logic with key chains
  • configure a key chain
  • describe authentication options with different routing protocols
  • list the tasks involved in configuring authentication for EIGRP
  • configure EIGRP authentication
  • configure authentication to secure EIGRP for IPv6
  • configure authentication under a named EIGRP configuration
  • list OSPF authentication configuration steps
  • configure OSPFv2 authentication in the network
  • configure OSPFv3 authentication in the network
  • list BGP authentication configuration steps
  • configure BGP for IPv6 authentication
  • secure routing protocols on a Cisco router
  • Course Number: