eigrp authentication presentation

14
EIGRP AUTHENTICATION April 23, 2016

Upload: danny-mendez

Post on 10-Jul-2016

11 views

Category:

Documents


1 download

DESCRIPTION

how eigrp authentication works

TRANSCRIPT

Page 1: Eigrp Authentication Presentation

EIGRP AUTHENTICATIONApril 23, 2016

Page 2: Eigrp Authentication Presentation

WHY USE EIGRP AUTHENTICATION?▪ Internal Gateway Protocol

▪ Assumes trust

▪ Improves overall network security

▪ Prevents false routing updates from infiltrating routing table▪ Deliberate

▪ Accidental

Page 3: Eigrp Authentication Presentation

CLASSIC EIGRP AUTH▪ Configure interfaces

▪ Configure key chain

▪ Configure EIGRP

▪ Enable EIGRP Authentication on interface▪ MD5

Page 4: Eigrp Authentication Presentation

NAMED EIGRP AUTH▪ Configure interfaces

▪ Configure key chain (optional)

▪ Configure EIGRP

▪ Enable EIGRP Authentication on interface▪ MD5

▪ SHA

Page 5: Eigrp Authentication Presentation

KEY CHAIN▪ Group of managed passwords

▪ Key chain <name>▪ Key <number>▪ Key-string <password>▪ Accept-lifetime (optional)▪ Send-lifetime (optional)

Page 6: Eigrp Authentication Presentation

KEY CHAIN

Page 7: Eigrp Authentication Presentation

KEY LIFETIME

Page 8: Eigrp Authentication Presentation

EXAMPLE TOPOLOGY

Page 9: Eigrp Authentication Presentation

CLASSIC EIGRP AUTH

Page 10: Eigrp Authentication Presentation

NAMED EIGRP AUTH

Page 11: Eigrp Authentication Presentation

COMBINED

Page 12: Eigrp Authentication Presentation

VERIFICATION

▪ show ip eigrp neighbors▪ Verify that neighbor adjacencies have formed

▪ show run | section router▪ Verify EIGRP configuration is correct, and authentication type matches

▪ show key chain▪ Verify that the key number and password match

Page 13: Eigrp Authentication Presentation

VERIFICATION

▪ debug eigrp packets▪ This will let you know why the authentication fails

Page 14: Eigrp Authentication Presentation

VERIFICATION

▪ If key numbers don’t match…

▪ If key-strings don’t match…