EIGRP Authentication Configuration Example

One of the ways to secure your EIGRP configuration is using Authentication.

Let’s imagine a scenario where someone wants to sabotage the routes in your network to replace them with their own, or even to remove them entirely. Without any EIGRP Authentication, they are free to do so.

Let’s see how it works:

Read more

What is VRF?

What?

  • VRF stands for Virtual Routing and Forwarding.
  • What VLANs do for Switches, VRF essentially do for Routers.
  • It allows us to run multiple instances of routing tables. Essentially we can virtualise multiple instances of a router and have them run on the same physical router device.
  • The same subnet can exist in multiple VRF routing tabled, this allows greater flexibility.
  • A VRF instance must be attached to an interface.
  • The Routing Tables are logically separate from each other. So if we were to check the routing table for each of these instances, we would only see the routes for that instance and no routes for any other instances.

Read more