How to configure EIGRP Authentication

Routing protocols can be configured to prevent receiving false routing updates and EIGRP is no exception. If you don’t use authentication and you are running EIGRP someone could try to form an EIGRP neighbor adjacency with one of your routers and try to mess with your network…we don’t want that to happen right?

EIGRP only offers MD5 authentication, there’s no plaintext authentication.

What does authentication offer us?

  • Your router will authenticate the source of each routing update packet that it will receive.
  • Prevents false routing updates from sources that are not approved.
  • Ignore malicious routing updates.

A potential hacker could be sitting on your network with a laptop running GNS3 / Dynamips, boot up a Cisco router and try the following things:

  • Try to establish a neighbor adjacency with one of your routers and advertise junk routes.
  • Send malicious packets and see if you can drop the neighbor adjacency of one of your authorized routers.

In order to configure EIGRP authentication we need to do the following:

  • Configure a key-chain
    • Configure a key ID under the key-chain.
      • Specify a password for the key ID.
      • Optional: specify accept and expire lifetime for the key.

Let’s use two routers and see if we can configure EIGRP MD5 authentication:

EIGRP with keys
The configuration for both routers is very basic:

Jack(config)#interface fastEthernet 0/0
Jack(config-if)#ip address

Jack(config)#router eigrp 12
John(config)#interface fastEthernet 0/0
John(config-if)#ip address

John(config)#router eigrp 12

The first thing we need to configure is a key-chain:

EIGRP Keychain

I called mine “KingKong” but it can be different on both routers, it doesn’t matter. The Key ID is a value that has to match on both routers and the key-string is the password which has to match of course.

Jack(config)#key chain KingKong
Jack(config-keychain)#key 1
Jack(config-keychain-key)#key-string Banana
Jack(config)#interface fastEthernet 0/0
Jack(config-if)#ip authentication mode eigrp 12 md5 
Jack(config-if)#ip authentication key-chain eigrp 12 KingKong

First you have to create the keychain and then you need to activate it on the interface. The “12” is the AS number of EIGRP. The configuration on router John is exactly the same.

John#debug eigrp packets 
EIGRP Packets debugging is on

John# EIGRP: FastEthernet0/0: ignored packet from, opcode = 5 (authentication off or key-chain missing)

You can check if your configuration is correct by using debug eigrp packets. You can see that we received a packet with MD5 authentication but I didn’t enable MD5 authentication yet on router John.

Let’s fix it:

John(config)#key chain KingKong
John(config-keychain)#key 1
John(config-keychain-key)#key-string Banana

John(config)#interface fastEthernet 0/0
John(config-if)#ip authentication mode eigrp 12 md5
John(config-if)#ip authentication key-chain eigrp 12 KingKong

Right away I can see that the EIGRP neighbor adjacency is working:

Full content of this lesson is only available to members.

Click the button below to join today and learn any networking topic you like!

Join NetworkLessons today

Digiprove sealCopyright protected by Digiprove © 2013 Rene Molenaar

Tags: , , , ,

3 Responses to “How to configure EIGRP Authentication”

  1. salis September 7, 2013 at 08:08 #

    hello thank you very much. you make CCNA look very easy. you talk me thank you once again

  2. milts September 15, 2013 at 21:14 #

    awesome lessons, simple and clearly documented.

  3. chandan May 23, 2014 at 18:28 #

    I really like the way you explain the things..its simple,clear and easy to understand.

Leave a Reply