When troubleshooting authentication issues, it is presumed the router adjacencies are configured correctly, so when deploying, do this first so the scope of your troubleshooting can be consolidated to authentication mechanisms, and not something like passive interfaces, etc. Some commands that are helpful in troubleshooting authentication for EIGRP: show key chaindebug eigrp packetsshow ip eigrp … Continue reading 15.6 EIGRP for IPv6 Authentication Verification
Category: Configuring EIGRP Authentication
15.5 Configuring Authentication in Named EIGRP
Consider the following illustration: Here is another example of its configuration: Note the following. The use of af-default in the address-family configuration mode allows for a default configuration to be deployed on all interfaces named in the configuration thereafter. For example, the interfaces Eth0/0-2 all inherit the default configuration, and individual configurations entered on each … Continue reading 15.5 Configuring Authentication in Named EIGRP
15.4 EIGRP for IPv6 Authentication Configuration
Consider the following illustration: Authentication for EIGRP IPv6 is the same as for IPv4. The only difference is in the ipv6 keyword associated with the authentication mode and authentication key-chain interface commands.
15.2 EIGRP Authentication Configuration Checklist
Consider the following illustration: There are three steps to consider when configuring EIGRP authentication. Configure the key chain. Each key is defined by a number, as in key 1.Configure the authentication mode. Note only MD5 is available in classic EIGRP, and named EIGRP also adds SHA hashing.Enable the authentication to use the key chain. Note … Continue reading 15.2 EIGRP Authentication Configuration Checklist