15.6 EIGRP for IPv6 Authentication Verification

When troubleshooting authentication issues, it is presumed the router adjacencies are configured correctly, so when deploying, do this first so the scope of your troubleshooting can be consolidated to authentication mechanisms, and not something like passive interfaces, etc. Some commands that are helpful in troubleshooting authentication for EIGRP: show key chaindebug eigrp packetsshow ip eigrp … Continue reading 15.6 EIGRP for IPv6 Authentication Verification

15.5 Configuring Authentication in Named EIGRP

Consider the following illustration: Here is another example of its configuration: Note the following. The use of af-default in the address-family configuration mode allows for a default configuration to be deployed on all interfaces named in the configuration thereafter. For example, the interfaces Eth0/0-2 all inherit the default configuration, and individual configurations entered on each … Continue reading 15.5 Configuring Authentication in Named EIGRP

15.2 EIGRP Authentication Configuration Checklist

Consider the following illustration: There are three steps to consider when configuring EIGRP authentication. Configure the key chain. Each key is defined by a number, as in key 1.Configure the authentication mode. Note only MD5 is available in classic EIGRP, and named EIGRP also adds SHA hashing.Enable the authentication to use the key chain. Note … Continue reading 15.2 EIGRP Authentication Configuration Checklist