15.5 Configuring Authentication in Named EIGRP

Consider the following illustration:

Here is another example of its configuration:

Note the following.

  1. The use of af-default in the address-family configuration mode allows for a default configuration to be deployed on all interfaces named in the configuration thereafter. For example, the interfaces Eth0/0-2 all inherit the default configuration, and individual configurations entered on each interface overrides the default.
  2. Note interface Eth0/0. It inherits the key chain configurations from the default interface configuration.
  3. Note interface Eth0/1. It specifies a SHA-2 password to be used in conjunction with the key chain inherited from the default interface. In this example, both the MD5 key-string inherited from the default interface configuration and the SHA-2 password will be required for successful authentication.
  4. Note interface Eth0/2. It specifies the SHA-2 password but disables the key chain authentication. Here, only the SHA-2 passphrase would be required for authentication.

Note the differences for configuring MD5 (128-bit) and SHA-2 (256-bit). They are configured differently.