You are on page 1of 14

EIGRP

AUTHENTICATIO
N
April 23, 2016

WHY USE EIGRP


AUTHENTICATION?
Internal Gateway Protocol
Assumes trust

Improves overall network security


Prevents false routing updates from infiltrating routing
table
Deliberate
Accidental

CLASSIC EIGRP AUTH


Configure interfaces
Configure key chain
Configure EIGRP
Enable EIGRP Authentication on interface
MD5

NAMED EIGRP AUTH


Configure interfaces
Configure key chain (optional)
Configure EIGRP
Enable EIGRP Authentication on interface
MD5
SHA

KEY CHAIN
Group of managed passwords
Key chain <name>
Key <number>
Key-string <password>
Accept-lifetime (optional)
Send-lifetime (optional)

KEY CHAIN

KEY LIFETIME

EXAMPLE TOPOLOGY

CLASSIC EIGRP AUTH

NAMED EIGRP AUTH

COMBINED

VERIFICATION
show ip eigrp neighbors
Verify that neighbor adjacencies have formed

show run | section router


Verify EIGRP configuration is correct, and authentication type
matches

show key chain


Verify that the key number and password match

VERIFICATION
debug eigrp packets
This will let you know why the authentication fails

VERIFICATION
If key numbers dont match

If key-strings dont match

You might also like