SlideShare a Scribd company logo
EIGRP Authentication & Load
Balancing
EIGRP Authentication
• EIGRP authentication is used to prevent an attacker from
forming the EIGRP neighbor relationship with your router and
advertising incorrect routing information. By using the same
preshared key (PSK) on all routers you can force EIGRP to
authenticate every EIGRP message. That way you can
ensure that your router accepts routing updates only from
trusted sources. To authenticate every message, the MD5
(Message Digest 5) algorithm is used.
• Three steps are required to configure EIGRP authentication:
1. creating a keychain
2. specifying a key string for a key
3. configuring EIGRP to use authentication
• EIGRP uses the concept of key chains. Each key chain can
have many keys, just like in real life. You can specify a
different lifetime interval of each key. That way the second key
in a key chain can be used after the first one is expired, the
third one after the second and so on. After you have created a
key chain with the corresponding keys, you need to enable
EIGRP authentication for a particular interface.
• To configure a router to use EIGRP configuration the
following commands are used:
1. (global-config) key chain NAME - creates a keychain
2. (config-keychain) key NUMBER - identifies the key number
3. (config-keychain-key) key-string STRING - specifies the
key string for the key
• Next, we need to enable EIGRP authentication on an
interface. From the interface mode, the following commands
are used:
4. (config-if) ip authentication mode eigrp ASN md5 - enables
EIGRP authentication on the interface
5. (config-if) ip authentication key-chain eigrp ASN
KEY_CHAIN_NAME - specifies the name of the key chain that
will be used for authentication
• NOTE - for the authentication to work, the key number and the
key string have to match on both routers! The key chain name
doesn't have to be the same on both routers.
The following example shows how EIGRP authentication is
configured.
• To establish a time frame for the validity of a key, you need to
configure the accept-lifetime and the send-lifetime parameters. The
syntax of the commands is:
(config-keychain-key) accept-lifetime start_time {infinite |
end_time | duration seconds}
(config-keychain-key) send-lifetime start_time {infinite |
end_time | duration seconds} 
• The first command specifies the time period during which the
key will be accepted. The second command specifies the time
period during which the key will be sent.
• For example, if we want to use a key only from January 1st,
2015 to December 1st, 2015, the following commands are
used:
EIGRP load balancing
• By default, EIGRP supports equal-cost load balancing over
four links. Equal-cost means that multiple routes must have
the same metric to reach a destination, so that router can
choose to load balance across equal cost links.
• To better understand the equal-cost load balancing concept,
consider the following example.
• All three routers are running EIGRP. Routers R2 and R3 are
connected to the subnet 10.0.1.0/24. Both routers advertise
the route to reach that subnet to R1. Router R1 receives the
two routing updates for the subnet 10.0.1.0/24 with the same
metric (the metric is the same because both routers connect
to the subnet 10.0.1.0/24 and R1 across the links with the
same bandwidth and delay values). Router R1 places both
routes in the routing table and load balances across three
links.
• You can verify that R1 is indeed using both paths by typing
the show ip route command:
• One of the advantages of EIGRP is that, unlike OSPF and
many other routing protocols, EIGRP also supports unequal-
cost load balancing. You can set up your router to load
balance over links with different metric to reach a
destination. To accomplish unequal-cost load balancing, the
variance command is used. The command takes one
parameter, the multiplier, which tells the router to load
balance across each link with the metric for the destination
less than the feasible distance multiplied by the multiplier
value.
• NOTE - the multiplier value, by default, is 1. The maximum
value is 128.
• Consider the following example.
All three routers are running EIGRP. Routers R2 and R3 are
connected to the subnet 10.0.1.0/24. Both routers advertise
the route to reach that subnet to R1. Router R1 chooses the
route from R2 as the best route. Let's say that R1 calculated
the metric of 40 for the path through R2. That route is placed
in the R1's routing table. But what if we want to load balance
traffic across the other link? The route through R3 has a
feasible distance of 30, which is less than the metric of the
successor route, so the feasibility condition has been met
and that route has been placed in the R1's topology table.
Let's say that R1 calculated the metric of 60 for the route
through R3. To enable load balancing across that link, you
need to use the variance command:
• (router-eigrp) variance MULTIPLIER
• In this example, the variance 2 command can be used. This
tells the router to load balance across any links with the
metric less then 80 (because 40 times 2 is 80). The route
through R3 is added to the routing table.
• NOTE - a path has to be a feasible successor route to be
used in unequal load balancing.
https://www.facebook.com/NetProtocol-Xpert-1459759190925583
https://in.linkedin.com/in/netprotocolxpert
https://plus.google.com/u/0/collection/AYQ-EB
https://branded.me/netprotocolxpert
https://twitter.com/NPX_cisco
Follow Us @

More Related Content

PPT
EIGRP Automatic & Manual Summarization
PPTX
EIGRP Overview
PPT
EIGRP Configuration
PPTX
PPTX
EIGRP (Enhanced Interior Gateway Routing Protocol)
PPTX
OSPF Summarization
PPTX
Route Redistribution
PPTX
Route Redistribution between OSPF and EIGRP
EIGRP Automatic & Manual Summarization
EIGRP Overview
EIGRP Configuration
EIGRP (Enhanced Interior Gateway Routing Protocol)
OSPF Summarization
Route Redistribution
Route Redistribution between OSPF and EIGRP

What's hot (20)

PPTX
OSPF Internal Route Summarization
PPTX
OSPF Summary LSA (Type 3 LSA)
PPTX
BGP (Border Gateway Protocol)
PPT
OSPF summary & Differences between OSPF and EIGRP
PPT
Eigrp
DOC
Ccna 2 chapter 10 v4.0 answers 2011
PPTX
Redistribution into OSPF
PPSX
RIP - Routing Information Protocol
PPT
1 egp
PPTX
BGP Weight Manipulation with Route Map
PPTX
Redistribution into EIGRP with Route Maps
DOC
Ccna 2 chapter 3 v4.0 answers 2011
PDF
Day 2 IP ROUTING
PPTX
EIGRP Routing Protocols
PPTX
IP ROUTING
PDF
Ccn pv7 route_sba-student-exam-4
PPT
Day 8 2 distance vector routing
PPTX
PPTX
LAYER 2 SWITCHING
OSPF Internal Route Summarization
OSPF Summary LSA (Type 3 LSA)
BGP (Border Gateway Protocol)
OSPF summary & Differences between OSPF and EIGRP
Eigrp
Ccna 2 chapter 10 v4.0 answers 2011
Redistribution into OSPF
RIP - Routing Information Protocol
1 egp
BGP Weight Manipulation with Route Map
Redistribution into EIGRP with Route Maps
Ccna 2 chapter 3 v4.0 answers 2011
Day 2 IP ROUTING
EIGRP Routing Protocols
IP ROUTING
Ccn pv7 route_sba-student-exam-4
Day 8 2 distance vector routing
LAYER 2 SWITCHING
Ad

Similar to EIGRP Authentication & Load Balancing (20)

PDF
Eigrp Summary (Ccna4.Com)
PPTX
CCNA ppt Day 5
PDF
EIGRP (enhanced interior gateway routing protocol)
PPTX
EIGRP Protocol.pptx
PDF
Eincop Netwax Lab: Route Redistribution
PDF
Route Redistribution
DOCX
Packet Tracer: Routing protocols EIGRP and OSPF
PPTX
GROUP TWO EIGRP protocol in Cisco 1.pptx
PPT
6978106.ppt
PDF
Routing Protocol EIGRP
PDF
ENARSI_Chapter_2 in PDF format easy to understand
PPTX
ENARSI_Chapter_2 in PPTX format easy to understand
PDF
Ccnav5.org ccna 3-v50_practice_final_exam_2014
PPTX
Administrative Distance & Metric
PDF
Testing tool for an automated ticketing system
PPTX
13. eigrp and ospf
PPTX
Group 1
PDF
EIGRP ZERO TO HERO
DOC
Eigrp
PDF
Building Scalable Cisco Internetworks (Bsci)
Eigrp Summary (Ccna4.Com)
CCNA ppt Day 5
EIGRP (enhanced interior gateway routing protocol)
EIGRP Protocol.pptx
Eincop Netwax Lab: Route Redistribution
Route Redistribution
Packet Tracer: Routing protocols EIGRP and OSPF
GROUP TWO EIGRP protocol in Cisco 1.pptx
6978106.ppt
Routing Protocol EIGRP
ENARSI_Chapter_2 in PDF format easy to understand
ENARSI_Chapter_2 in PPTX format easy to understand
Ccnav5.org ccna 3-v50_practice_final_exam_2014
Administrative Distance & Metric
Testing tool for an automated ticketing system
13. eigrp and ospf
Group 1
EIGRP ZERO TO HERO
Eigrp
Building Scalable Cisco Internetworks (Bsci)
Ad

More from NetProtocol Xpert (20)

PPTX
Basic Cisco ASA 5506-x Configuration (Firepower)
PPTX
MPLS Layer 3 VPN
PPTX
Common Layer 2 Threats, Attacks & Mitigation
PPTX
Storm-Control
PPTX
Dynamic ARP Inspection (DAI)
PPTX
IP Source Guard
PPTX
DHCP Snooping
PPTX
Password Recovery
PPTX
Application & Data Center
PPTX
Cisco ISR 4351 Router
PPTX
Cisco ASR 1001-X Router
PPTX
Securing management, control & data plane
PPTX
Point to-point protocol (ppp), PAP & CHAP
PPTX
Avoid DNS lookup when mistyping a command
PPTX
TCLSH and Macro Ping Test on Cisco Routers and Switches
PPTX
Private VLANs
PPTX
MTU (maximum transmission unit) & MRU (maximum receive unit)
PPTX
OTV Configuration
PPTX
Cisco OTV 
PPTX
OTV(Overlay Transport Virtualization)
Basic Cisco ASA 5506-x Configuration (Firepower)
MPLS Layer 3 VPN
Common Layer 2 Threats, Attacks & Mitigation
Storm-Control
Dynamic ARP Inspection (DAI)
IP Source Guard
DHCP Snooping
Password Recovery
Application & Data Center
Cisco ISR 4351 Router
Cisco ASR 1001-X Router
Securing management, control & data plane
Point to-point protocol (ppp), PAP & CHAP
Avoid DNS lookup when mistyping a command
TCLSH and Macro Ping Test on Cisco Routers and Switches
Private VLANs
MTU (maximum transmission unit) & MRU (maximum receive unit)
OTV Configuration
Cisco OTV 
OTV(Overlay Transport Virtualization)

Recently uploaded (20)

PPTX
Geodesy 1.pptx...............................................
PPTX
UNIT 4 Total Quality Management .pptx
PPTX
bas. eng. economics group 4 presentation 1.pptx
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPTX
Construction Project Organization Group 2.pptx
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PPT
Project quality management in manufacturing
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
DOCX
573137875-Attendance-Management-System-original
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
Internet of Things (IOT) - A guide to understanding
PPT
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPTX
Lecture Notes Electrical Wiring System Components
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
Geodesy 1.pptx...............................................
UNIT 4 Total Quality Management .pptx
bas. eng. economics group 4 presentation 1.pptx
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
R24 SURVEYING LAB MANUAL for civil enggi
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Construction Project Organization Group 2.pptx
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
Project quality management in manufacturing
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
Operating System & Kernel Study Guide-1 - converted.pdf
Model Code of Practice - Construction Work - 21102022 .pdf
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
573137875-Attendance-Management-System-original
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
Internet of Things (IOT) - A guide to understanding
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
Lecture Notes Electrical Wiring System Components
Embodied AI: Ushering in the Next Era of Intelligent Systems

EIGRP Authentication & Load Balancing

  • 1. EIGRP Authentication & Load Balancing
  • 2. EIGRP Authentication • EIGRP authentication is used to prevent an attacker from forming the EIGRP neighbor relationship with your router and advertising incorrect routing information. By using the same preshared key (PSK) on all routers you can force EIGRP to authenticate every EIGRP message. That way you can ensure that your router accepts routing updates only from trusted sources. To authenticate every message, the MD5 (Message Digest 5) algorithm is used. • Three steps are required to configure EIGRP authentication: 1. creating a keychain 2. specifying a key string for a key 3. configuring EIGRP to use authentication
  • 3. • EIGRP uses the concept of key chains. Each key chain can have many keys, just like in real life. You can specify a different lifetime interval of each key. That way the second key in a key chain can be used after the first one is expired, the third one after the second and so on. After you have created a key chain with the corresponding keys, you need to enable EIGRP authentication for a particular interface. • To configure a router to use EIGRP configuration the following commands are used: 1. (global-config) key chain NAME - creates a keychain 2. (config-keychain) key NUMBER - identifies the key number 3. (config-keychain-key) key-string STRING - specifies the key string for the key
  • 4. • Next, we need to enable EIGRP authentication on an interface. From the interface mode, the following commands are used: 4. (config-if) ip authentication mode eigrp ASN md5 - enables EIGRP authentication on the interface 5. (config-if) ip authentication key-chain eigrp ASN KEY_CHAIN_NAME - specifies the name of the key chain that will be used for authentication • NOTE - for the authentication to work, the key number and the key string have to match on both routers! The key chain name doesn't have to be the same on both routers.
  • 5. The following example shows how EIGRP authentication is configured. • To establish a time frame for the validity of a key, you need to configure the accept-lifetime and the send-lifetime parameters. The syntax of the commands is: (config-keychain-key) accept-lifetime start_time {infinite | end_time | duration seconds} (config-keychain-key) send-lifetime start_time {infinite | end_time | duration seconds} 
  • 6. • The first command specifies the time period during which the key will be accepted. The second command specifies the time period during which the key will be sent. • For example, if we want to use a key only from January 1st, 2015 to December 1st, 2015, the following commands are used:
  • 7. EIGRP load balancing • By default, EIGRP supports equal-cost load balancing over four links. Equal-cost means that multiple routes must have the same metric to reach a destination, so that router can choose to load balance across equal cost links. • To better understand the equal-cost load balancing concept, consider the following example.
  • 8. • All three routers are running EIGRP. Routers R2 and R3 are connected to the subnet 10.0.1.0/24. Both routers advertise the route to reach that subnet to R1. Router R1 receives the two routing updates for the subnet 10.0.1.0/24 with the same metric (the metric is the same because both routers connect to the subnet 10.0.1.0/24 and R1 across the links with the same bandwidth and delay values). Router R1 places both routes in the routing table and load balances across three links.
  • 9. • You can verify that R1 is indeed using both paths by typing the show ip route command:
  • 10. • One of the advantages of EIGRP is that, unlike OSPF and many other routing protocols, EIGRP also supports unequal- cost load balancing. You can set up your router to load balance over links with different metric to reach a destination. To accomplish unequal-cost load balancing, the variance command is used. The command takes one parameter, the multiplier, which tells the router to load balance across each link with the metric for the destination less than the feasible distance multiplied by the multiplier value. • NOTE - the multiplier value, by default, is 1. The maximum value is 128.
  • 11. • Consider the following example.
  • 12. All three routers are running EIGRP. Routers R2 and R3 are connected to the subnet 10.0.1.0/24. Both routers advertise the route to reach that subnet to R1. Router R1 chooses the route from R2 as the best route. Let's say that R1 calculated the metric of 40 for the path through R2. That route is placed in the R1's routing table. But what if we want to load balance traffic across the other link? The route through R3 has a feasible distance of 30, which is less than the metric of the successor route, so the feasibility condition has been met and that route has been placed in the R1's topology table. Let's say that R1 calculated the metric of 60 for the route through R3. To enable load balancing across that link, you need to use the variance command: • (router-eigrp) variance MULTIPLIER
  • 13. • In this example, the variance 2 command can be used. This tells the router to load balance across any links with the metric less then 80 (because 40 times 2 is 80). The route through R3 is added to the routing table. • NOTE - a path has to be a feasible successor route to be used in unequal load balancing.