EIGRP SHA Authentication Summary
- Only Named EIGRP support SHA Authentication.
- SHA Authentication can be configured password directly without Key Chain.
- When Key Chain configured in SHA Authentication, Key Chain is used in Authentication calculation.
- When Multiple Key IDs are configured, Small Key Number is used.
This EIGRP SHA Authentication Lab is step-by-step Lab guide.
Lab explains how to configure EIGRP SHA Authentication without Key Chain and With Key Chain. Also show debug output.
Download Lab Guide > EIGRP SHA Authentication
Nyi Nyi Min, CCNP, CCDP, is a Instructor and Course
Developer on CCNA, CCNP, CCIE. He holds multiple
professional certifications from Cisco Juniper,
Microsoft, VMware, etc.. and worked and supported
several enterprise networks. He is Founder of
IP6 Networks (www.ip6networks.com), where he currently teaches
CCNA, CCNP Classes.