eigrp authentication presentation
DESCRIPTION
how eigrp authentication worksTRANSCRIPT
EIGRP AUTHENTICATIONApril 23, 2016
WHY USE EIGRP AUTHENTICATION?▪ Internal Gateway Protocol
▪ Assumes trust
▪ Improves overall network security
▪ Prevents false routing updates from infiltrating routing table▪ Deliberate
▪ Accidental
CLASSIC EIGRP AUTH▪ Configure interfaces
▪ Configure key chain
▪ Configure EIGRP
▪ Enable EIGRP Authentication on interface▪ MD5
NAMED EIGRP AUTH▪ Configure interfaces
▪ Configure key chain (optional)
▪ Configure EIGRP
▪ Enable EIGRP Authentication on interface▪ MD5
▪ SHA
KEY CHAIN▪ Group of managed passwords
▪ Key chain <name>▪ Key <number>▪ Key-string <password>▪ Accept-lifetime (optional)▪ Send-lifetime (optional)
KEY CHAIN
KEY LIFETIME
EXAMPLE TOPOLOGY
CLASSIC EIGRP AUTH
NAMED EIGRP AUTH
COMBINED
VERIFICATION
▪ show ip eigrp neighbors▪ Verify that neighbor adjacencies have formed
▪ show run | section router▪ Verify EIGRP configuration is correct, and authentication type matches
▪ show key chain▪ Verify that the key number and password match
VERIFICATION
▪ debug eigrp packets▪ This will let you know why the authentication fails
VERIFICATION
▪ If key numbers don’t match…
▪ If key-strings don’t match…