Chapter 11 Routing Protocols
ZyWALL USG 50-H User’s Guide
245
11.4 Routing Protocol Technical Reference
Here is more detailed information about RIP and OSPF.
Authentication Types
Authentication is used to guarantee the integrity, but not the confidentiality, of routing
updates. The transmitting router uses its key to encrypt the original message into a smaller
message, and the smaller message is transmitted with the original message. The receiving
router uses its key to encrypt the received message and then verifies that it matches the smaller
message sent with it. If the received message is verified, then the receiving router accepts the
updated routing information. The transmitting and receiving routers must have the same key.
The ZyWALL supports three types of authentication for RIP and OSPF routing protocols:
•
None
- no authentication is used.
•
Text
– authentication using a plain text password, and the (unencrypted) password is sent
over the network. This method is usually used temporarily to prevent network problems.
•
MD5
– authentication using an MD5 password and authentication ID.
MD5 is an authentication method that produces a 128-bit checksum, called a message-digest,
for each packet. It also includes an authentication ID, which can be set to any value between 1
and 255. The ZyWALL only accepts packets if these conditions are satisfied.
• The packet’s authentication ID is the same as the authentication ID of the interface that
received it.
Authentication
Select which authentication method to use in the virtual link. This authentication
protects the integrity, but not the confidentiality, of routing updates.
None
uses no authentication.
Text
uses a plain text password that is sent over the network (not very secure).
MD5
uses an MD5 password and authentication ID (most secure).
Same as Area
has the virtual link also use the
Authentication
settings above.
Text
Authentication
Key
This field is available if the
Authentication
is
Text
. Type the password for text
authentication. The key can consist of alphanumeric characters and the
underscore, and it can be up to 8 characters long.
MD5
Authentication ID
This field is available if the
Authentication
is
MD5
. Type the default ID for MD5
authentication in the area. The ID can be between 1 and 255.
MD5
Authentication
Key
This field is available if the
Authentication
is
MD5
. Type the default password for
MD5 authentication in the area. The password can consist of alphanumeric
characters and the underscore, and it can be up to 16 characters long.
Add icon
This column provides icons to add and remove virtual links.
To add a virtual link, click the
Add
icon at the top of the column. A new record
appears in the virtual link list.
To delete a virtual link, click on the
Remove
icon next to the virtual link. The web
configurator confirms that you want to delete the virtual link.
OK
Click
OK
to save your changes back to the ZyWALL.
Cancel
Click
Cancel
to exit this screen without saving.
Table 90
Network > Routing > OSPF > Edit (continued)
LABEL
DESCRIPTION
Summary of Contents for ZyWall USG 50-H Series
Page 2: ......
Page 10: ...Safety Warnings ZyWALL USG 50 H User s Guide 10...
Page 28: ...Table of Contents ZyWALL USG 50 H User s Guide 28...
Page 30: ...30...
Page 34: ...Chapter 1 Introducing the ZyWALL ZyWALL USG 50 H User s Guide 34...
Page 40: ...Chapter 2 Features and Applications ZyWALL USG 50 H User s Guide 40...
Page 92: ...Chapter 5 Configuration Basics ZyWALL USG 50 H User s Guide 92...
Page 130: ...Chapter 6 Tutorials ZyWALL USG 50 H User s Guide 130...
Page 146: ...146...
Page 208: ...Chapter 8 Interface ZyWALL USG 50 H User s Guide 208 Figure 161 Network Interface Bridge Add...
Page 224: ...Chapter 9 Trunks ZyWALL USG 50 H User s Guide 224...
Page 250: ...Chapter 12 Zones ZyWALL USG 50 H User s Guide 250...
Page 280: ...Chapter 16 ALG ZyWALL USG 50 H User s Guide 280...
Page 286: ...Chapter 17 IP MAC Binding ZyWALL USG 50 H User s Guide 286...
Page 287: ...287 PART III Firewall Firewall 289...
Page 288: ...288...
Page 304: ...Chapter 18 Firewall ZyWALL USG 50 H User s Guide 304...
Page 306: ...306...
Page 356: ...Chapter 21 SSL User Screens ZyWALL USG 50 H User s Guide 356...
Page 358: ...Chapter 22 SSL User Application Screens ZyWALL USG 50 H User s Guide 358...
Page 368: ...Chapter 24 L2TP VPN ZyWALL USG 50 H User s Guide 368...
Page 394: ...Chapter 25 L2TP VPN Example ZyWALL USG 50 H User s Guide 394...
Page 395: ...395 PART V Application Patrol Application Patrol BWM 397...
Page 396: ...396...
Page 421: ...421 PART VI Anti X ADP 423...
Page 422: ...422...
Page 429: ...Chapter 27 ADP ZyWALL USG 50 H User s Guide 429 Figure 359 Profiles Traffic Anomaly...
Page 432: ...Chapter 27 ADP ZyWALL USG 50 H User s Guide 432 Figure 360 Profiles Protocol Anomaly...
Page 440: ...Chapter 27 ADP ZyWALL USG 50 H User s Guide 440...
Page 442: ...442...
Page 462: ...Chapter 29 Addresses ZyWALL USG 50 H User s Guide 462...
Page 474: ...Chapter 31 Schedules ZyWALL USG 50 H User s Guide 474...
Page 484: ...Chapter 32 AAA Server ZyWALL USG 50 H User s Guide 484...
Page 506: ...Chapter 34 Certificates ZyWALL USG 50 H User s Guide 506...
Page 510: ...Chapter 35 SSL Application ZyWALL USG 50 H User s Guide 510...
Page 511: ...511 PART VIII System System 513...
Page 512: ...512...
Page 552: ...552...
Page 584: ...Chapter 40 Diagnostics ZyWALL USG 50 H User s Guide 584...
Page 586: ...Chapter 41 Reboot ZyWALL USG 50 H User s Guide 586...
Page 596: ...Chapter 43 Product Specifications ZyWALL USG 50 H User s Guide 596...
Page 598: ...598...
Page 636: ...Appendix A Log Descriptions ZyWALL USG 50 H User s Guide 636...
Page 640: ...Appendix B Common Services ZyWALL USG 50 H User s Guide 640...
Page 646: ...Appendix C Importing Certificates ZyWALL USG 50 H User s Guide 646...