Cisco ROUTE 2.0: Routers and Routing Protocol Hardening

This course is included in our On-demand training solution.


This course consists of two parts. The first part explains how to secure Cisco routers using recommended practices. The second part explains the benefits of routing protocol authentication and shows how to configure routing authentication for different routing protocols. It is important to be aware that router security is critical to network security. This course lists recommended steps for securing a Cisco router. This course then focuses on configuring authentication for the routing protocols: EIGRP, OSPF, and BGP. You can prevent your router from receiving false route updates by configuring routing protocol authentication. Authentication options are examined before going into configuration of authentication options for each routing protocol.

Target Audience

Anyone wishing to obtain real-world routing knowledge, and those that are considering CCNP and CCIP certification. This learning path’s discussion of routing could also benefit early CCIE Routing and Switching candidates. Students completing the ROUTE 2.0 learning path should have a solid foundation in routing fundamentals, Cisco IOS basics, and Cisco routing basics. Attending the ICND1 and ICND2 classes or having the CCNA certification will fulfill these expectations.



Expected Duration

120 min.

Course Objectives

Course Introduction

Cisco IOS Security Checklist

  • describe tasks to secure Cisco routers
  • Router Security Policies

  • recognize what a router security policy should define
  • Encrypting Passwords in Cisco IOS

  • secure your vty, console lines, and access to the privileged mode with encrypted passwords
  • Securing Management Connectivity with SSH

  • configure the router to use only SSH
  • Using ACLs to Secure Management Access

  • use an ACL to restrict access to a Cisco router
  • SNMP Security

  • secure SNMP
  • Configuring Backups

  • back up configuration files
  • Logging on a Cisco IOS Router

  • describe the importance of implementing network monitoring tools, such as SNMP, syslog, and NetFlow
  • Disabling Unused Services

  • describe the need to disable unused network services
  • Routing Protocol Authentication

  • describe neighbor authentication options
  • Time-Based Key Chains

  • describe time-based logic with key chains
  • Time-Based Key Chains II

  • configure a key chain
  • Routing Protocol Authentication Options

  • describe authentication options with different routing protocols
  • Authenticating in EIGRP

  • list the tasks involved in configuring authentication for EIGRP
  • Configuring EIGRP Authentication

  • configure EIGRP authentication
  • Configuring Authentication in EIGRP for IPv6

  • configure authentication to secure EIGRP for IPv6
  • Configuring Authentication for Named EIGRP

  • configure authentication under a named EIGRP configuration
  • Configuring OSPFv2 Authentication

  • list OSPF authentication configuration steps
  • Demonstrating OSPFv2 Authentication

  • configure OSPFv2 authentication in the network
  • Configuring OSPFv3 Authentication

  • configure OSPFv3 authentication in the network
  • Configuring BGP Authentication

  • list BGP authentication configuration steps
  • Configuring MP-BGP Authentication

  • configure BGP for IPv6 authentication
  • Exercise: Securing Routing Protocols