Download - Eigrp Authentication Presentation
![Page 1: Eigrp Authentication Presentation](https://reader036.vdocuments.mx/reader036/viewer/2022062502/577c7e1d1a28abe054a0998a/html5/thumbnails/1.jpg)
EIGRP AUTHENTICATIONApril 23, 2016
![Page 2: Eigrp Authentication Presentation](https://reader036.vdocuments.mx/reader036/viewer/2022062502/577c7e1d1a28abe054a0998a/html5/thumbnails/2.jpg)
WHY USE EIGRP AUTHENTICATION?▪ Internal Gateway Protocol
▪ Assumes trust
▪ Improves overall network security
▪ Prevents false routing updates from infiltrating routing table▪ Deliberate
▪ Accidental
![Page 3: Eigrp Authentication Presentation](https://reader036.vdocuments.mx/reader036/viewer/2022062502/577c7e1d1a28abe054a0998a/html5/thumbnails/3.jpg)
CLASSIC EIGRP AUTH▪ Configure interfaces
▪ Configure key chain
▪ Configure EIGRP
▪ Enable EIGRP Authentication on interface▪ MD5
![Page 4: Eigrp Authentication Presentation](https://reader036.vdocuments.mx/reader036/viewer/2022062502/577c7e1d1a28abe054a0998a/html5/thumbnails/4.jpg)
NAMED EIGRP AUTH▪ Configure interfaces
▪ Configure key chain (optional)
▪ Configure EIGRP
▪ Enable EIGRP Authentication on interface▪ MD5
▪ SHA
![Page 5: Eigrp Authentication Presentation](https://reader036.vdocuments.mx/reader036/viewer/2022062502/577c7e1d1a28abe054a0998a/html5/thumbnails/5.jpg)
KEY CHAIN▪ Group of managed passwords
▪ Key chain <name>▪ Key <number>▪ Key-string <password>▪ Accept-lifetime (optional)▪ Send-lifetime (optional)
![Page 6: Eigrp Authentication Presentation](https://reader036.vdocuments.mx/reader036/viewer/2022062502/577c7e1d1a28abe054a0998a/html5/thumbnails/6.jpg)
KEY CHAIN
![Page 7: Eigrp Authentication Presentation](https://reader036.vdocuments.mx/reader036/viewer/2022062502/577c7e1d1a28abe054a0998a/html5/thumbnails/7.jpg)
KEY LIFETIME
![Page 8: Eigrp Authentication Presentation](https://reader036.vdocuments.mx/reader036/viewer/2022062502/577c7e1d1a28abe054a0998a/html5/thumbnails/8.jpg)
EXAMPLE TOPOLOGY
![Page 9: Eigrp Authentication Presentation](https://reader036.vdocuments.mx/reader036/viewer/2022062502/577c7e1d1a28abe054a0998a/html5/thumbnails/9.jpg)
CLASSIC EIGRP AUTH
![Page 10: Eigrp Authentication Presentation](https://reader036.vdocuments.mx/reader036/viewer/2022062502/577c7e1d1a28abe054a0998a/html5/thumbnails/10.jpg)
NAMED EIGRP AUTH
![Page 11: Eigrp Authentication Presentation](https://reader036.vdocuments.mx/reader036/viewer/2022062502/577c7e1d1a28abe054a0998a/html5/thumbnails/11.jpg)
COMBINED
![Page 12: Eigrp Authentication Presentation](https://reader036.vdocuments.mx/reader036/viewer/2022062502/577c7e1d1a28abe054a0998a/html5/thumbnails/12.jpg)
VERIFICATION
▪ show ip eigrp neighbors▪ Verify that neighbor adjacencies have formed
▪ show run | section router▪ Verify EIGRP configuration is correct, and authentication type matches
▪ show key chain▪ Verify that the key number and password match
![Page 13: Eigrp Authentication Presentation](https://reader036.vdocuments.mx/reader036/viewer/2022062502/577c7e1d1a28abe054a0998a/html5/thumbnails/13.jpg)
VERIFICATION
▪ debug eigrp packets▪ This will let you know why the authentication fails
![Page 14: Eigrp Authentication Presentation](https://reader036.vdocuments.mx/reader036/viewer/2022062502/577c7e1d1a28abe054a0998a/html5/thumbnails/14.jpg)
VERIFICATION
▪ If key numbers don’t match…
▪ If key-strings don’t match…