Lab 3
Lab 3
EIGRP Authentication I
Objective
Understand the Enhanced Interior Gateway Routing Protocol (EIGRP) authentication process, and
configure the routers in the simulated network to require EIGRP authentication before they advertise routes
to or accept routing table updates from EIGRP neighbors.
Lab Topology
The topology diagram below represents the NetMap in the Simulator. The simulated network for this lab
consists of five routers connected by point-to-point WAN links. Each router also has a LAN connected to its
FastEthernet interface. Each LAN has one host PC connected. This simulated network is comparable to an
actual network connecting five geographically separate offices, each with a LAN to which desktop PCs and
servers are connected. The network is fully functional. You should be able to log on to the console of any
device and successfully ping any of the other devices in the network.
HostA HostD
192.168.2.2 S0/0 192.168.3.2
S0/1
192.168.100.2 192.168.100.14
Fa0/0
512K Fa0/0
192.168.2.1 192.168.3.1
S0/1 S0/0
Tampa 192.168.100.9 192.168.100.10 Miami
Fa0/1
192.168.100.17
Fa0/1
192.168.100.18
Command Summary
Command Description
clear ip route * clears the IP routing table
configure terminal enters global configuration mode from privileged EXEC mode
enable enters privileged EXEC mode
end ends and exits configuration mode
exit exits one level in the menu structure
The IP addresses and subnet masks used in this lab are shown in the following tables:
IP Addresses
Device Interface IP Address Subnet Mask
Daytona Serial 0/0 192.168.100.6 255.255.255.252
Serial 0/1 192.168.100.13 255.255.255.252
FastEthernet 0/0 192.168.4.1 255.255.255.0
KeyWest FastEthernet 0/1 192.168.100.18 255.255.255.252
FastEthernet 0/0 192.168.5.1 255.255.255.0
Miami Serial 0/0 192.168.100.10 255.255.255.252
Serial 0/1 192.168.100.14 255.255.255.252
FastEthernet 0/1 192.168.100.17 255.255.255.252
FastEthernet 0/0 192.168.3.1 255.255.255.0
Orlando Serial 0/0 192.168.100.1 255.255.255.252
Serial 0/1 192.168.100.5 255.255.255.252
FastEthernet 0/0 192.168.1.1 255.255.255.0
Tampa Serial 0/0 192.168.100.2 255.255.255.252
Serial 0/1 192.168.100.9 255.255.255.252
FastEthernet 0/0 192.168.2.1 255.255.255.0
Lab Tasks
The routers have been configured with admin as the password at console prompts, cisco as the password
at enable prompts, and sanfran as the virtual terminal (vty) password.
2. How many possible paths could be taken by traffic between HostE and HostB? _______________
3. What path does traffic from HostE follow as it moves through the network to HostB? ___________
4. Why do the routers in this network choose the path you noted in the previous step? ____________
______________________________________________________________________________
5. What is the EIGRP autonomous system (AS) number in the simulated network? _______________
What purpose does this number serve? ______________________________________________
______________________________________________________________________________
B. Verify Connectivity
1. From HostE, ping HostA (192.168.2.2), HostB (192.168.1.2), HostC (192.168.4.2), and HostD
(192.168.3.2). Are these pings successful? ____________________________________________
2. From HostB, ping KeyWest’s FastEthernet 0/0 interface (192.168.5.1). Is this ping successful? ___
2. What are some potential disadvantages of EIGRP authentication? How might they be mitigated?
______________________________________________________________________________
______________________________________________________________________________
2. On Miami, create a key chain named MyKeyChain2 and add a key with the key string sanjose.
Create this key as key 1.
3. Prepare to set up EIGRP authentication between KeyWest and Miami. Which interfaces on these
routers are responsible for sending routing table updates between KeyWest and Miami? ________
______________________________________________________________________________
4. Configure the authentication mode on the interfaces you noted in the previous step. The EIGRP
authentication mode is configured on a per-interface basis. You should configure the EIGRP
authentication mode on the router interfaces that are responsible for sending routing table updates
between KeyWest and Miami.
5. On KeyWest, configure the authentication key that will be used for EIGRP authentication. Reference
the key chain that you created earlier.
6. On Miami, configure the authentication key that will be used for EIGRP authentication. Reference
the key chain that you created earlier.
7. Do key chain names need to be identical on each router? Do key strings need to be identical? ___
______________________________________________________________________________
9. Is Miami sending EIGRP updates from or receiving updates on its LAN interface? _____________
10. Is KeyWest sending EIGRP updates from or receiving updates on its LAN interface? ___________
11. Why might it be a good idea to configure EIGRP authentication on the FastEthernet interfaces of
KeyWest and Miami? _____________________________________________________________
B. Verify Connectivity
1. From HostE, ping HostA (192.168.2.2), HostB (192.168.1.2), HostC (192.168.4.2), and HostD
(192.168.3.2). Are these pings successful? ____________________________________________
If not, review and correct your configuration.
2. From HostB, ping KeyWest’s FastEthernet 0/0 interface (192.168.5.1). Is this ping successful? ___
If not, review and correct your configuration.
C. Verify Authentication
1. Remove the key chain from KeyWest.
3. After the network has converged, display KeyWest’s routing table. What do you observe? _______
______________________________________________________________________________
4. How are the changes that you observed in the routing table related to the removal of the key chain?
Briefly explain. __________________________________________________________________
______________________________________________________________________________
6. After the network has converged, display KeyWest’s routing table. What do you observe? _______
______________________________________________________________________________
7. Based on the behavior you observed in the previous steps, what conclusion can you draw regarding
the operation of EIGRP authentication between KeyWest and Miami? _______________________
______________________________________________________________________________
2. Configure EIGRP authentication on the Tampa–Miami serial links. The configuration is not graded as
part of this lab.
3. Configure EIGRP authentication on the Miami–Daytona serial links. The configuration is not graded
as part of this lab.
4. Configure EIGRP authentication on the Daytona–Orlando serial links. The configuration is not
graded as part of this lab.
Once you have completed this lab, be sure to check your work by using the grading function.
You can do so by clicking the Grade Lab icon ( ) in the toolbar or by pressing Ctrl+G.
KeyWest#show ip route
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, * - candidate default
U - per-user static route
3. You can use the tracert command to determine the path that traffic takes from HostE to HostB
(192.168.1.2). Traffic first goes to the default gateway of HostE, which is KeyWest (192.168.5.1).
The traffic then travels from KeyWest to Miami (192.168.100.17), then to Tampa (192.168.100.9),
and finally to Orlando (192.168.100.1), which will deliver the traffic to its destination, HostB
(192.168.1.2). This route from HostE to HostB is shown in the output below:
C:>tracert 192.168.1.2
5. You can use the show ip protocols command to determine that the EIGRP AS number in the
simulated network is 100. This number uniquely identifies an EIGRP process. It is possible to run
multiple EIGRP processes on the same router by giving each instance of EIGRP its own AS number.
The network commands, which are a part of the EIGRP configuration, determine which interfaces
are associated with which EIGRP processes. Sample output from is shown below:
KeyWest#show ip protocols
Routing Protocol is “eigrp 100”
Outgoing update filter list for all interfaces is not set
Incoming update filter list for all interfaces is not set
Default networks flagged in outgoing updates
Default networks accepted from incoming updates
EIGRP metric weight K1=1, K2=0, K3=1, K4=0, K5=0
EIGRP maximum hopcount 100
EIGRP maximum metric variance 1
Redistributing:
Automatic network summarization is not in effect
Routing for Networks:
192.168.100.0
192.168.5.0
Routing Information Sources:
Gateway Distance Last Update
192.168.100.17 90 00:00:45
Distance: internal 90 external 170
B. Verify Connectivity
1. Yes, pings from HostE to HostA (192.168.2.2), HostB (192.168.1.2), HostC (192.168.4.2), and HostD
(192.168.3.2) are successful.
C:>ping 192.168.2.2
C:>ping 192.168.1.2
C:>ping 192.168.4.2
C:>ping 192.168.3.2
2. Yes, a ping from HostB to KeyWest’s FastEthernet 0/0 interface (192.168.5.1) is successful.
C:>ping 192.168.5.1
2. The major security risk associated with unauthenticated EIGRP is that any router added to the
network can be configured with EIGRP and will automatically be included in the EIGRP topology
as long as the AS number and network requirements are met. It is possible that an unknown or
unauthorized router could be accidentally or maliciously connected to the network. This router could
then be configured to negatively impact the routing topology of the entire network.
3. KeyWest’s FastEthernet 0/1 interface and Miami’s FastEthernet 0/1 interface are directly connected
to each other and are therefore responsible for sending EIGRP updates between these two routers.
4. On KeyWest and Miami, issue the following commands to configure the EIGRP authentication mode:
The EIGRP authentication mode is configured on a per-interface basis. You should configure the
EIGRP authentication mode on the router interfaces that are responsible for sending routing table
updates between KeyWest and Miami.
5. On KeyWest, use the following command to configure the authentication key that will be used for
EIGRP authentication:
6. On Miami, use the following command to configure the authentication key that will be used for
EIGRP authentication:
7. The names of the key chains do not have to be identical on each router. The key strings, however,
must be identical.
8. The key strings are used to create an MD5 hash, which is included in each EIGRP packet sent from
the selected interface. The router receiving the EIGRP packet will generate its own MD5 hash from
its key chain. If the hashes match, the EIGRP packet will be accepted and processed. Remember
that you should configure the EIGRP authentication mode on both routers and the key strings must
match on both routers.
9. Miami is the only router connected to its LAN; therefore, it is not currently sending EIGRP updates
from or receiving EIGRP updates on its FastEthernet 0/0 interface.
10. KeyWest the only router connected to its LAN; therefore, it is not currently sending EIGRP updates
from or receiving EIGRP updates on its FastEthernet 0/0 interface.
11. It would be a good practice to configure EIGRP authentication on KeyWest’s FastEthernet 0/0
interface and on Miami’s FastEthernet 0/0 interface to protect the routing topology in the event that
an unknown or unauthorized router is connected to the Miami LAN or the KeyWest LAN.
KeyWest#show ip route
<output omitted>
B. Verify Connectivity
1. Yes, pings from HostE to HostA (192.168.2.2), HostB (192.168.1.2), HostC (192.168.4.2), and HostD
(192.168.3.2) should be successful.
C:>ping 192.168.2.2
C:>ping 192.168.1.2
C:>ping 192.168.4.2
C:>ping 192.168.3.2
2. Yes, a ping from HostB to KeyWest’s FastEthernet 0/0 interface (192.168.5.1) should be successful.
C:>ping 192.168.5.1
C. Verify Authentication
1. On KeyWest, issue the following commands to remove the key chain:
2. Issue the following command to delete all routes from KeyWest’s routing table:
KeyWest#clear ip route *
KeyWest#show ip route
<output omitted>
4. Removing the key chain from KeyWest prevents KeyWest from authenticating with Miami;
therefore, Miami no longer accepts EIGRP packets from KeyWest, thereby ending the EIGRP
neighbor relationship between Miami and KeyWest. As a result, the EIGRP routes are dropped from
KeyWest’s routing table.
5. On KeyWest, issue the following commands to add the key chain to the FastEthernet 0/1 interface
on KeyWest:
6. After the network has converged, issue the show ip route command on KeyWest. Because you re-
created the key chain on KeyWest, the router can once again authenticate with the EIGRP process
on Miami, thus restoring the EIGRP neighbor relationship between KeyWest and Miami; as a result,
KeyWest and Miami once again begin to exchange EIGRP packets and the EIGRP routes are put
back into KeyWest’s routing table. Sample output is shown below:
KeyWest#show ip route
<output omitted>
7. Based on the behavior observed in the previous steps, EIGRP authentication will allow routes to be
advertised between routers only if those routes are configured with a valid key.
2. Use the commands you learned in the previous tasks to configure EIGRP authentication on the
Tampa–Miami serial links. The configuration is not graded as part of this lab.
3. Use the commands you learned in the previous tasks to configure EIGRP authentication on the
Miami–Daytona serial links. The configuration is not graded as part of this lab.
Copyright © 1996–2017 Boson Software, LLC. All rights reserved. NetSim software and documentation are protected by copyright law.