Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

Task 1: Configure EIGRP authentication over LAN interfaces

1. What steps did you take to configure EIGRP authentication on a LAN


segment?
Examiner la configuration EIGRP
Definir el tipo de autenticacin.
Definir cuantas KEYS sern utilizadas.
Definir un tiempo de vida para los parmetros.
2. How can you configure keys so they do not expire?
accept-lifetime start-time {infinite | end-time | duration seconds}
send-lifetime start-time {infinite | end-time | duration seconds}

Ejemplo:
Device(config)# key chain key1
Device(config-keychain)# key 1
Device(config-keychain-key)# key-string 0987654321
Device(config-keychain-key)# accept-lifetime 04:00:00 Dec 4 2006 infinite
Device(config-keychain-key)# send-lifetime 04:00:00 Dec 4 2006 04:48:00 Dec
4 1996
Device(config-keychain-key)# exit
Device(config-keychain)# key 2
Device(config-keychain-key)# key-string 1234567890
Device(config-keychain-key)# accept-lifetime 04:00:00 Jan 4 2007 infinite
Device(config-keychain-key)# send-lifetime 04:45:00 Jan 4 2007 infinite
3. How can you define the key chain used for router authentication?
R1(config)#key chain RML
R1(config-keychain)#key 1
R1(config-keychain-key)#key-string duoc.cl
R2(config)#key chain GSP
R2(config-keychain)#key 1
R2(config-keychain-key)#key-string duoc.cl

Task 2: Configure EIGRP authentication over WAN interfaces

4. What steps did you take to configure EIGRP authentication on a WAN


segment?
Configurar el modo de autenticacin para EIGRP
Configurar el KEY CHAIN
Configurar el tiempo de vida para cada KEY en el KEY CHAIN.
Habilitar la autenticacion para el uso de la o las KEY int the KEY CHAINS
5. How can you configure keys so they do not expire?
6. How can you define the key chain used for router authentication?

R2(config-if)#ip
R2(config-if)#ip
R1(config-if)#ip
R1(config-if)#ip

authentication
authentication
authentication
authentication

mode eigrp 61 md5


key-chain eigrp 61 HEM
mode eigrp 61 md5
key-chain eigrp 61 JKM

7. Did you have enough information to create an implementation plan?


8. Did you enable EIGRP authentication on the LAN interfaces?
Yes:
Router(config-if)# ip authentication mode eigrp 1 md5
9. Did you use a secure authentication method for authentication over LAN
interfaces?
Yes:
R2(config-if)#ip authentication mode eigrp 61 md5
R2(config-if)#ip authentication key-chain eigrp 61 HEM
R2(config-if)#
10.Did you establish adjacencies between the routers over the LAN
interface and enter EIGRP routes into the IP routing table?
Yes.
11.Did you enable EIGRP authentication on the WAN interfaces?
R2(config-if)#ip authentication key-chain eigrp 61 HEM
R1(config-if)#ip authentication key-chain eigrp 61 JKM
12.Did you use a secure authentication method for authentication over WAN
interfaces?
Yes, Key 1 and Key 2

13.Did you establish adjacencies between the routers over WAN interface
and enter EIGRP routes into the IP routing table?
Yes.

You might also like