Category Archives: AUTHENTICATION

Securing Your EIGRP Neighbor Relationships with HMAC-SHA-256 & HMAC-SHA-512

A common best practice is to secure any routing protocol’s control plane to protect it against malicious attacks.  Cisco’s Enhanced Interior Gateway Routing Protocol (EIGRP) is no different!  In this video tutorial we take a deep dive look at how to secure your EIGRP control plane using HMAC-SHA-256 and HMAC-SHA-512 authentication (remember, it isn’t confidentiality/encryption, it is just authentication!) by leveraging key chains.  Even better, we see how to do this with EIGRP’s Named Mode (a.k.a, EIGRP 64-bit mode)!