1 / 10

Implementing an EIGRP-Based Solution

Lab 2 - 3 Debrief. Implementing an EIGRP-Based Solution. Lab Topology. Lab Review: What Did You Accomplish?. Task 1: Configure EIGRP authentication over LAN interfaces What steps did you take to configure EIGRP authentication on a LAN segment ?

kyrene
Download Presentation

Implementing an EIGRP-Based Solution

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Lab 2-3 Debrief Implementing an EIGRP-Based Solution

  2. Lab Topology

  3. Lab Review: What Did You Accomplish? • Task 1: Configure EIGRP authentication over LAN interfaces • What steps did you take to configure EIGRP authentication on a LAN segment? • How can you configure keys so they do not expire? • How can you define the key chain used for router authentication? • Task 2: Configure EIGRP authentication over WAN interfaces • What steps did you take to configure EIGRP authentication on a WAN segment? • How can you configure keys so they do not expire? • How can you define the key chain used for router authentication?

  4. Verification • Did you have enough information to create an implementation plan? • Did you enable EIGRP authentication on the LAN interfaces? • Did you use a secure authentication method for authentication over LAN interfaces? • Did you establish adjacencies between the routers over the LAN interface and enter EIGRP routes into the IP routing table? • Did you enable EIGRP authentication on the WAN interfaces? • Didi you use a secure authentication method for authentication over WAN interfaces? • Did you establish adjacencies between the routers over WAN interface and enter EIGRP routes into the IP routing table?

  5. Checkpoints • Configure the key chain to use for authentication on LAN interfaces. • Configure a key to use in the key chain for authentication over the LAN interfaces. • Enable secure authentication on LAN segments. • Use the defined key chain for router authentication. • Configure another key chain to use for authentication on WAN interfaces. • Configure a key to use in the key chain for authentication over the WAN interfaces. • Enable secure authentication on WAN segments. • Use the defined key chain for router authentication.

  6. Sample Solution • Use static routes to establish reachability instead of a routing protocol, which is typically not recommended, as static routes do not scale. • Another routing protocol can be used to implement a similar solution and use the supported authentication type. Changing the routing protocol is not a realistic solution as changing the routing protocol is not the case during fine tuning of the existing protocol.

  7. Alternative Solutions • Use static routes to establish reachability instead of routing protocol, which is typically not possible, as static routes do not scale. • Another routing protocol can be used to implement a similar solution. Changing the routing protocol is not a realistic solution.

  8. Q and A • Why should you use authentication with routing protocols? • What kind of authentication does EIGRP support? • When do the keys in a key chain expire? • Can you change the key expiration time? • What is the difference between authentication on LAN and WAN segments?

  9. Summary • Configure EIGRP authentication on LAN segments, where the key without expiration is used in the key chain. • Configure EIGRP authentication on WAN segments, where the key without expiration is used in the key chain.

More Related