EIGRP: Authentication

EIGRP supports both MD5 and SHA-2 hashing algorithms, where MD5 is supported in classic and named mode and SHA-2 is only supported in named mode.

Configuration of authentication includes the use of Keys and Keychains, where you can optionally set the time frame where certain keys are valid and others are not.  If multiple keys are eligible at a certain time of day the key with the lowest Key ID is selected.

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s