eigrp authentication presentation

Post on 10-Jul-2016

11 Views

Category:

Documents

1 Downloads

Preview:

Click to see full reader

DESCRIPTION

how eigrp authentication works

TRANSCRIPT

EIGRP AUTHENTICATIONApril 23, 2016

WHY USE EIGRP AUTHENTICATION?▪ Internal Gateway Protocol

▪ Assumes trust

▪ Improves overall network security

▪ Prevents false routing updates from infiltrating routing table▪ Deliberate

▪ Accidental

CLASSIC EIGRP AUTH▪ Configure interfaces

▪ Configure key chain

▪ Configure EIGRP

▪ Enable EIGRP Authentication on interface▪ MD5

NAMED EIGRP AUTH▪ Configure interfaces

▪ Configure key chain (optional)

▪ Configure EIGRP

▪ Enable EIGRP Authentication on interface▪ MD5

▪ SHA

KEY CHAIN▪ Group of managed passwords

▪ Key chain <name>▪ Key <number>▪ Key-string <password>▪ Accept-lifetime (optional)▪ Send-lifetime (optional)

KEY CHAIN

KEY LIFETIME

EXAMPLE TOPOLOGY

CLASSIC EIGRP AUTH

NAMED EIGRP AUTH

COMBINED

VERIFICATION

▪ show ip eigrp neighbors▪ Verify that neighbor adjacencies have formed

▪ show run | section router▪ Verify EIGRP configuration is correct, and authentication type matches

▪ show key chain▪ Verify that the key number and password match

VERIFICATION

▪ debug eigrp packets▪ This will let you know why the authentication fails

VERIFICATION

▪ If key numbers don’t match…

▪ If key-strings don’t match…

top related