100 likes | 225 Views
Lab 2 - 3 Debrief. Implementing an EIGRP-Based Solution. Lab Topology. Lab Review: What Did You Accomplish?. Task 1: Configure EIGRP authentication over LAN interfaces What steps did you take to configure EIGRP authentication on a LAN segment ?
E N D
Lab 2-3 Debrief Implementing an EIGRP-Based Solution
Lab Review: What Did You Accomplish? • Task 1: Configure EIGRP authentication over LAN interfaces • What steps did you take to configure EIGRP authentication on a LAN segment? • How can you configure keys so they do not expire? • How can you define the key chain used for router authentication? • Task 2: Configure EIGRP authentication over WAN interfaces • What steps did you take to configure EIGRP authentication on a WAN segment? • How can you configure keys so they do not expire? • How can you define the key chain used for router authentication?
Verification • Did you have enough information to create an implementation plan? • Did you enable EIGRP authentication on the LAN interfaces? • Did you use a secure authentication method for authentication over LAN interfaces? • Did you establish adjacencies between the routers over the LAN interface and enter EIGRP routes into the IP routing table? • Did you enable EIGRP authentication on the WAN interfaces? • Didi you use a secure authentication method for authentication over WAN interfaces? • Did you establish adjacencies between the routers over WAN interface and enter EIGRP routes into the IP routing table?
Checkpoints • Configure the key chain to use for authentication on LAN interfaces. • Configure a key to use in the key chain for authentication over the LAN interfaces. • Enable secure authentication on LAN segments. • Use the defined key chain for router authentication. • Configure another key chain to use for authentication on WAN interfaces. • Configure a key to use in the key chain for authentication over the WAN interfaces. • Enable secure authentication on WAN segments. • Use the defined key chain for router authentication.
Sample Solution • Use static routes to establish reachability instead of a routing protocol, which is typically not recommended, as static routes do not scale. • Another routing protocol can be used to implement a similar solution and use the supported authentication type. Changing the routing protocol is not a realistic solution as changing the routing protocol is not the case during fine tuning of the existing protocol.
Alternative Solutions • Use static routes to establish reachability instead of routing protocol, which is typically not possible, as static routes do not scale. • Another routing protocol can be used to implement a similar solution. Changing the routing protocol is not a realistic solution.
Q and A • Why should you use authentication with routing protocols? • What kind of authentication does EIGRP support? • When do the keys in a key chain expire? • Can you change the key expiration time? • What is the difference between authentication on LAN and WAN segments?
Summary • Configure EIGRP authentication on LAN segments, where the key without expiration is used in the key chain. • Configure EIGRP authentication on WAN segments, where the key without expiration is used in the key chain.