Академический Документы
Профессиональный Документы
Культура Документы
Configuration overview:
To configure EIGRP authentication, the keys used in the authentication process have
to be configured and attached to an interface along with MD5 as the mode of
authentication. Any interface that has authentication configured on it will not form
neighbor relationships out that interface unless the neighbor passes the
authentication process.
The configuration of EIGRP message authentication is carried out in two steps:
B#config t
B(config)#int se1/1
B(config-if)#ip ?
Interface IP configuration subcommands:
access-group
accounting
address
authentication
authentication subcommands
B(config-if)#ip authentication ?
key-chain key-chain
mode
mode
key
Configure a key
no
B(config-keychain)#key ?
<0-2147483647> Key identifier
B(config-keychain)#key 10
B(config-keychain-key)#key-string cisco
B(config-keychain-key)#
*May 1 13:39:07.647: %DUAL-5-NBRCHANGE: EIGRP-IPv4 10: Neighbor 2.1.1.2
(Serial1/1) is up: new adjacency
B#sh key chain
Key-chain riyadh: