FINAL RESEARCH REPORT
ALP 5559 SUMMER 2018

MD5 AUTHENTICATION IN EIGRP NETWORK

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

WIRELESS NETWORKING
GROUP 2

Submitted by
HARSH KA PATEL C0693333
JASWINDER SINGH C0693294
GAGANDEEP SINGH C0694315

Table of Contents
Introduction……………………………………………………………………………………………………………………3
Software Used…………………………………………………………………………………………………………………5
Network Devices……………………………………………………………………………………………………………..6
System Topology…………………………………………………………………………………………………………….7
Types of Authentication………………………………………………………………………………………………..16
Configuration Techniques……………………………………………………………………………………………..19
Problem Statement & Solution………………………………………………………………………………………25
Results………………………………………………………………………………………………………………………….26
Conclusion……………………………………………………………………………………………………………………27
References…………………………………………………………………………………………………………………….29

INTRODUCTION
Our project is to implement EIGRP (Enhanced interior gateway routing protocol) and the Authentication Technique used by EIGRP to protect or encrypt the data which is MD5 Authentication. We will implement and configure MD5 authentication in EIGRP.
By default no authentication is used for EIGRP packets. We can configure EIGRP to use MD5 authentication. When EIGRP authentication is configured on router, the source of each routing packets get updates when it receives.
The MD5 in EIGRP prevents unauthorized of false routing messages from non relevant sources.
To authenticate MD5 in EIGRP we need to configure authenticating key and Id on both sides i.e. sending router and receiving router. Each key has its own unique Id and is stored locally. The combination of each key Id associated with message is used to identify and authenticate algorithm.
EIGRP is higher version of IGRP developed by Cisco. Unlike IGRP and RIP, EIGRP does not send route updates. EIGRP updates are just sent when topology gets change. EIGRP supports for variable length subnet mask, support for partial updates and support for multiple network layer protocols.
EIGRP only supports Message Digest 5 (MD5) authentication to prevent incorrect and false message routing information from unauthorized source or sender.
To configure EIGRP, keys are used in process of authentication and attached to interface including MD5 as mode of authentication. Any interface which has authentication configure on it.
Enhanced Interior Gateway Routing Protocol (EIGRP). By configuring this we can prevent false route update by neighbour authentication and also neighbour authentication such that routers can take part in routing based on password which is predefined.
EIGRP MD5 Authentication
By default there is no authentication used for EIGRP packets. We can configure EIGRP to use MD5 authentication.
When EIGRP authentication is configured on router, the router authenticates the source of each routing packets which is received. There is an MD5 packet digest which includes keys in it and it prevents unauthorized or false routing message from unapproved sources.
In EIGRP MD5 authentication we must configure authentication key and a key id on both the sending and receiving router. Each key has its own key id which is stored locally.
The combination of key id and the interface has message uniquely identifies the authentication algorithm and MD5 authentication key in use.
In EIGRP it allows keys which are managed by key chains. Only one authentication packet is sent if though many valid keys are exists.
Keys are not used during time periods for which they are not activated. By this issue we are recommended that for the key chain which is given to us key activation times overlap to avoid any period of time for which no key is activated.
Message Digest (MD5):- It is a widely used hash function producing a 128-bit hash value. Also it is used as cryptographic hash function.
Project Goal:-
Our project goal is to prevent unauthorized messages sent from false or unauthenticated source.
Objective 1:-
Required MD5 Authentication in EIGRP
Strategy
• EIGRP authentication can integrate MD5 authentication in it to keep updates of routes in routing table. Each MD5 has digest which includes keys in each packets routed through EIGRP to prevent unauthorized or false routing messages from unapproved sources.
Objective 2:-
Create Key id and specify its key number.
Strategy
• Each key has its own key id, which is stored locally and can be specify by key number, key chain configuration commands. The combination of key id and key interface is linked with the message and it identifies uniquely and gets authenticated while MD5 authentication key is in use.
We can configure multiple keys in key chains within specific lifetimes provided. Only one authentication packet is sent from many keys exist. It automatically searches the key numbers in order from low to high and it uses the very first key which is encountered.
Retrived From https://www.cisco.com/c/en/us/support/docs/ip/enhanced-interior-gateway-routing-protocol-EIGRP/82110-EIGRP-authentication.html
http://www.ciscopress.com/articles/article.asp?p=687478&seqNum=4
SOFTWARE USED
Software Used: Cisco Packet Tracer 5.3.2

Operating System: Microsoft Windows 8

CPU Speed: 2GHz recommended or higher
Processor : Pentium Processor or above
Memory/RAM: 1GB minimum, 2GB recommended or higher
Display Properties: Greater than 256 color depth
Size of Hard Disk: 60 GB minimum NIC Card

Packet Tracer

Packet Tracer is a Cisco router simulator that can be utilized in training and education, but also in research for simple computer network simulations. The tool is created by Cisco Systems and provided for free distribution to faculty, students, and alumni who are or have participated in the Cisco Networking Academy. The purpose of Packet Tracer is to offer students and teachers a tool to learn the principles of networking as well as develop Cisco technology specific skills.

Features

The current version of Packet Tracer supports an array of Simulated Application Layer protocols, as well as basic routing with RIP, OSPF, and EIGRP, to the extent required by the current CCNA curriculum. While Packet Tracer aims to provide a realistic simulation of functional networks, the application itself utilizes only a small number of features found within the actual hardware running a current Cisco IOS version. Thus, Packet Tracer is unsuitable for modeling production networks. With the introduction of version 5.3, several new features were added, including BGP. BGP is not part of the CCNA curriculum, but part of the CCNP curriculum.

NETWORK DEVICES
In our topology it shows the configuration of EIGRP which is authenticated by MD5.
Here we have used Routers, Switches, Pc’s (Computers), Crossover cable, and LAN cables.

Crossover Cable’s:- It is used for connecting two devices that use the same transmit and receiving pair.

Ethernet Cable’s:- An Ethernet cable is one of the most popular cables used on wired networks. Ethernet cables are the cables which connect devices with each other with a local area network such as PC’s, Routers, and Switches.

In our below configuration we have first connected all the Routers, Switches, And PC’s with required cables. We have connected two routers with crossover cables and then routers to switches with Ethernet cables and then also Switches to PC’s with Ethernet cables.

SYSTEM TOPOLOGY

Fig 1
In the above fig 1 it shows the network which is connected and configured by EIGRP routing protocol configuration and with security which is called as MD5 authentication.

Fig 1.a
In above Fig 1.a we had shown configuration of two routers connected and which is interconnected with switches and PC’s.
First of all both the routers are connected with serial cable. Then after individual routers are connected with switches with Fast Ethernet cable and which is then connected with two PC’s also by Fast Ethernet cable.
Here we have configured two routers with EIGRP protocol and with that we have configured MD5 authentication in it.
Router 0 and Router 1 here are assigned as Neighbors in which they can communicate with each other in a network with authentication configured within them so that no other false communication can take place between them.

Fig 1.b
Here in above Fig 1.b we have created network in which the Router 2 is connected with another Router 1 with serial cable and on other hand the Router 2 is connected with Switch 2 by Fast Ethernet cable and Switch 2 is connected by Fast Ethernet to PC 4.
IP Address is assigned to the network are as follows:-
Router 2 192.168.50.4
Router 2 – Switch 2 192.168.40.1
PC 4 192.168.40.1
Here this network is not configured by EIGRP and which not authenticated with MD5 to just ensure that this network cannot communicate with another network i.e. Router 0 which is authenticated with MD5.

FLOW CHART

CONFIGURATION OF EIGRP AND MD5 AUTHENTICATION
Following are steps (commands) to configure EIGRP network and also configure MD5 authentication:-

Fig 2.a
In above figure 2.a it states the configuration of EIGRP on Router 0; here EIGRP 10 is name of it and network IP is also assigned to Router 0.

Fig 2.b
In above figure 2.b shows the configuration of EIGRP in Router 1 as same as configured in Router 0 but with different IP’s.

Fig 2.c

Fig 2.c.1
Here in above figure 2.c and 2.c.1 shows the neighbor router or connection of each other that is Router 0 and Router 1.

Fig 2.d

Fig 2.d.1
Here in above figure 2.d and 2.d.1 completely shows how to create key id i.e. we have created key id 1, and it also shows how to create key chain and key strings.
Here key chain for router 0 is chainr1 and key chain for router 1 is chain r2.
Key string for router 0 is harsh and for router 1 is harsh1.
And also we have configured MD5 authentication in both the routers by entering the command i.e.
ip authentication mode EIGRP 10 MD5
ip authentication key-chain EIGRP 10 chainr1
?
NETWORK PROTOCOLS
A networked computer must also have one or more protocol drivers (sometimes called a transport protocol or just a protocol). The protocol driver works between the upper-level network software and the network adapter to package data to be sent on the network.
In most cases, for two computers to communicate on a network, they must use identical protocols. Sometimes, a computer is configured to use multiple protocols. In this case, we have to use route redistribution between the routers to use the multiple protocols between them.

PROTOCOLS USED
In this project we are using following protocol:-
• EIGRP
EIGRP (Enhanced Interior Gateway Routing Protocol):
Enhanced Interior Gateway Routing Protocol (EIGRP) based on their original IGRP while it is a Cisco proprietary routing protocol. It is a distance-vector routing Protocol.
Advantages of EIGRP are:
• During normal operations there is very low usage of network resources; only few packets are transmitted if the network is stable.
• When there is any change happen in the network then there is only change in the routing table which reduced the load of this protocol itself.

The algorithm used in this protocol is known as Diffused Update Algorithm (DUAL) to calculate the shortest path to a destination within a network.

?
IPV4 SCHEME
There are five types of classes in Ip address they are as follows
Class Address Range Supports
Class A 1.0.0.1 to 126.255.255.254 Supports 16 million hosts on each of 127 networks.
Class B 128.1.0.1 to 191.255.255.254 Supports 65,000 hosts on each of 16,000 networks.
Class C 192.0.1.1 to 223.255.254.254 Supports 254 hosts on each of 2 million networks.
Class D 224.0.0.0 to 239.255.255.255 Reserved for multicast groups.
Class E 240.0.0.0 to 254.255.255.254 Reserved for future use, or Research and Development Purpose

IP USED
List of IP’s used in our project:-
DEVICES
INTERFACE IP’S
Router 0 Serial Se0/0/0 192.168.20.1
Router 1 Serial Se0/0/0 – Se0/1/0 192.168.20.2 – 192.168.50.3
Router 2 Serial Se0/0/0 192.168.50.4
PC 0 Fast Ethernet Fa0/2 192.168.10.2
PC 1 Fast Ethernet Fa0/3 192.168.10.3
PC 2 Fast Ethernet Fa0/2 192.168.30.2
PC 3 Fast Ethernet Fa0/3 192.168.30.3
PC 4 Fast Ethernet Fa0/2 192.168.40.2

TYPES OF AUTHENTICATION
There are lots of authentication methods that are to be used in different routing protocols. EIGRP also uses two types of method for authentication.
These methods are: – MD5 authentication and SHA-256 authentication.
1. MD5 authentication in EIGRP: – MD5 (message digest) authentication is a method in which we used the same pre-shared key along with key id and key chain. So such method of authentication routing table is protected from the willfully or accidental corruption. MD5 authentication can be configured in classic mode or named mode.
It also ensures that our routers allow the routing messages only from the routers that have same pre-shared key. If something is not configured for message authentication then it stops receiving routing messages from them until they are not configured.
Configure EIGRP MD5 authentication: –
1. Create the keychain and key id.
MD5 authentication in EIGRP depends on a keychain to be in function. So a key chain and at least one key must be created before enabling the authentication.
2. Configure the EIGRP authentication to use the created keychain and key.
After the creation of key chain and key, we have to configure the EIGRP to perform MD5 authentication with the key. At last, completion of configuration can only be done on the interfaces successfully if the EIGRP is configured on.

2. SHA-256 authentication in EIGRP: – This is the new method of authentication that is to be used for EIGRP, nowadays. It is an advance method of authentication that is more secure than the MD5 authentication. Unlike MD5 authentication, it can only be configured in named mode.
So in this method we can choose whether we use an interface password or we want to choose a keychain. This authentication method is much simpler than the MD5 authentication because we have to use only one command for the configuration.
Password authentication: – We can use single or multiple password option in SHA-256 password authentication. We have to provide them the password for the authentication which they have to enter before making the connection. So a secret password is shared by the routers to authenticate a specified user.
Key-chain authentication: – Another method to use SHA-250 authentication is key chain authentication in which we will add a key chain with a single key ID and key string. Now the key string is also shared a secret key which is different than the password authentication method.
In SHA-256 authentication with the key chain, the main advantage over MD5 is that we can change the passwords without resetting the neighbor adjacency.
EIGRP Authentication and Authorization:
Authentication: Authentication is the process to know who you are, for example when you are entering in a company or any visiting location, first process is to check your ID to know who you are, which comes under authentication section.
Authorization: Authorization is the process to verifying that to what section or application or protocol you are authorized (permitted) to enter. In below example, After Authentication process the Authorization process occurs in which security guy or Visitor support team will let you know that to which sections you can visit or enter with your current Authentication Level.
In an organization there are different Authorization levels assigned to employees according to their designation For example, Sales team can only access to sales department files but cannot access the Account department files or section, But the Director of the Organization have access to the all departments of the company.

The Diagram given above illustrates the difference between the Authorization and Authentication. There are five devices (A, B, C, D and E) in the network. First when these devices want to be in the network, authenticate the devices and then authorize them some useful services. In this example, when these devices want to connect to the network, then first network gets the detail about each device to know that what type of device it is. That is done by asking their IPs and their specification. All the devices are being authenticated.
The next step is to give them some features or rights that are to be used within the network. This step is known as authorization. In the above example, network allows only device “C” to use some services and all the other devices being rejected.

EIGRP Authorization Methods: Authorization in EIGRP (Enhanced Interior Gateway Routing Protocol) is also known as EIGRP Authentication per Neighbour. As, EIGRP Authorization can only be enabled on interface (single access network) level, But to enable it on multi access network by following these
Steps (Methods):
1. Use key (key ID) “R1-R2” for the link between the first two routers Router 1 and Router 2.

2. Use key (Id) “R1-R3” for the link between the Router 1 and Router 3.

3. The Name of the EIGRP should remain the same .

4. Virtual-Templates

In Above Diagram, Router 1 is the Hub router or the main Router which is authorized to access the both routers Router1 and Router 2. But on the other hand Router 2 and Router 3 cannot access to each Other, Different key Ids used for the both links. Routers R2 and R3 have different key Id to reach Router1.
Virtual-Templates: Virtual Template interface is used to combine the two or more than two (multiple) interfaces into one virtual interface also called virtual-template.
We will create virtual-Templates and will attach the key chain to the corresponding (accordingly) Virtual-Templates this will help us to use different keys between different neighbours.

CONFIGURATION TECHNIQUES
Enhanced Interior Gateway Routing Protocol (EIGRP). By configuring this we can prevent false route update by neighbour authentication and also neighbour authentication such that routers can take part in routing based on password which is predefined.
Router Authentication
Neighbour router authentication is configured in such a way that the routers only can take part in routing based on password which is predefined.
First, there is no authentication is used for routing protocol packets. When neighbour router authentication is been configured on router, it authenticates source of each routing packet that received. This process is enclosed by authentication key which is known by the sender and receiver router.
The router uses two types of authentication:-
• Simple password authentication-Supported by ISIS, OSPF, RIP.
• MD5 authentication-supported by EIGRP, OSPF, BGP, RIP.
EIGRP MD5 Authentication
By default there is no authentication used for EIGRP packets. We can configure EIGRP to use MD5 authentication.
When EIGRP authentication is configured on router, the router authenticates the source of each routing packets which is received. There is an MD5 packet digest which includes keys in it and it prevents unauthorized or false routing message from unapproved sources.
In EIGRP MD5 authentication we must configure authentication key and a key id on both the sending and receiving router. Each key has its own key id which is stored locally.
The combination of key id and the interface has message uniquely identifies the authentication algorithm and MD5 authentication key in use.
In EIGRP it allows keys which are managed by key chains. Only one authentication packet is sent if though many valid keys are existing.
Keys are not used during time periods for which they are not activated. By this issue we are recommended that for the key chain which is given to us key activation times overlap to avoid any period of time for which no key is activated.

Steps to Configuring MD5 Authentication
• Enter configuration mode for the interface on which we need to enable authentication.
• Ip authentication mode EIGRP autonomous-system md5 interface configuration command specify md5 authentication for EIGRP. In this autonomous-system is the EIGRP autonomous system number in which authentication is used.
• Ip authentication key-chain EIGRP autonomous-system name-of-chain interface commands enable the authentication of EIGRP packets with a key specified in a key chain. Here name-of-chain parameter specifies the name of authentication key chain from which a key is to be obtain for this interface.
• Enter the configuration mode for the key chain using key chain name-of-chain command.
• Key key-id key-chain command identifies a key id to use and configuration mode for that specific key. Here the key-id is the id number of an authentication key on a key-chain. The range of keys is from 0 to 2147483647.
• Key-string key key-chain-key command identifies the key password for the specific key. The key is the authentication key-string which is used to authenticate sent and receive EIGRP packets. Here the key password contain from 1 to 80 uppercase and lowercase alphanumeric characters. Except the first character cannot be a number.
• accept-lifetime start-time {infinite| end-time| duration seconds} key-chain-key configuration command specifies the time period during which this key will be accepted for use on receiving packets.
• Send-lifetime start-time {infinite| end-time| duration seconds} key-chain-key command specifies the time period during this key can be used for sending packets.

Key Configuration Techniques
Key configuration: – Configuration of keys in any network allow administrator to enable or disable any feature or service of the application for the users. By disabling any unnecessary feature we can prevent the network from any potential attack.
Key configuration is way in which we use a key or key chain to authenticate any outside or inside entity of the network who wants to connect with any device of the network.
In key configuration a key is exchanged between the two or more devices that want to connect in the network. For example, if device A wants to connect with device B then device A will generate a key that will provided only to the device B such that no other device can see their messages. Thus key configuration provides the confidentiality such that if some other or unwanted device that willingly or by mistake connect to network cannot be connect until it provides a required key.
We can use different approaches to configure a key for the network. To configure a key a key ID is generated which is provided to the trusted devices.
There are certain ways from which we can provide security key configuration that is used in the network: –
For every network a secret key that is shared or private key is generated.
Shared key: – It is generated by the router that is used by the overall network or the devices in it to use the common services provided by the server. For example, if a server or a router wants to provide a read only service to all the devices in the network (not to the devices outside the network) then it can use shared key configuration. So by entering the password or key id any device can access the service or read the data that is provided by the network.
Private Key: – It is the key that is only be provided to the device by a device which wants to connect to each other such that no other device can interfere to their connection. For example, in a network device A want to send a message only to the device B such that no other device can know about it, then device A configure a private that is known only by the device B such that it can access the message.
This type of Key should be on temporary or permanent, like, for temporary generated key, small span of time a key is provided to the user in which he is allowed to access the service and after that session the temporary generated key is expired.
For permanent key, there is no time limit to use the key, and in this there is not only no limit on the amount of time but also we can use that same key several of times. So the user who knows the key can have an access to the information at any time. Thus permanent key is the key that cannot be expired easily and can be used tin EIGRP authentication.
Steps for the Configuration of Key that does not expire: –
Step 1: – Create a key-chain
Key chains have three necessary components and two optional components. The necessary components are key chain name, key number or key id and key string. And optional components are that we can include an accept-lifetime and send a lifetime parameter that will decide which keys are used on the key chain.
A. The first thing is to give a unique or particular name to the key chain from which its network can easily be identified. This configuration is done in router.
Key chain
B. After creating a name we are in key chain configuration command. In this we have to generate a key id or key number that is also unique.
Key
C. To accomplish the key chain and key id in functioning we have to do setting the key string. It is kind of same thing that a shared secret password will need to match the key strings configured on the neighboring routers. So key string on all the routers should be same.
Key-string

Step 2: – Apply the key chain to the interface
Any device that has an authentication configured on it will not form any kin d of neighbor relationship out of that network until the neighbor device passes the authentication process. To apply the key chain authentication on any network we must have to issue the two commands that are: –
Ip authentication mode EIGRP md5
Ip authentication key-chain
After that step the key is successfully configured on the network.

EIGRP Accounting Methods and Techniques
Final step in EIGRP AAA framework is accounting which measures the resources a user consumes during access. In which this includes the amount of system time or the amount of data a user is sending or receiving during a session.
In this accounting is carried out by logging of the session which reports the statistics and usage information and this is used for authorization control, billing, trend, analysis, resource utilization, and capacity planning activities.

EIGRP Features Summary

Features Description
Transport IP, protocol type 88 which does not use UDP or TCP.
Metric Based on constrained bandwidth and cumulative delay by default, and optionally load, reliability, and MTU.
Hello Interval Interval at which a router sends EIGRP Hello messages on an interface.
Hold Timer Timer used to determine when a neighboring router has failed, based on a router not receiving any EIGRP messages, including Hellos, in this timer period.
Update destination address Normally sent to 224.0.0.9, with retransmissions being sent to each neighbor’s unicast IP address.
Full or Partial updates Full updates are used when new neighbors are discovered; otherwise, partial updates are used.
Authentication Supports MD5 authentication only.
VLSM/Classless EIGRP includes the mask with each route, also allowing it to support discontinuous networks and VLSM.
Route Tags Allows EIGRP to tag routes as they are redistributed into EIGRP.
Next-Hop Field Supports the advertisement of routes with a different next-hop router than the advertising router.
Manual route summarization Allows route summarization at any point in the EIGRP network.
Multiprotocol Supports the advertisement of IPX and AppleTalk routes.

PROBLEM STATEMENT & SOLUTIONS

Vision: – We want to create a MD5 network which is that much secure that the network not only provides authenticity but also confidentiality as well.
Issue Statement: – Today there are lots of methods in MD5 where message digest is sent instead of the key. It does provide the authenticity but the problem is that confidentiality of the network is not maintained. By using these authentication methods there are possibilities that we get false or unauthorized messages from some unauthenticated sources.
Method: – To improve such thing like confidentiality we will use EIGRP that supports MD5 authentication and it provides highly secured network.
Issue Statement: – The main concern of EIGRP is neighbour issue, loss of hello packets.
Method: – To resolve this issue we need to check that the link is stable, we need to make sure that the value of hold interval is configured is larger than hello interval also we need to check that the link is bidirectional. Check that sufficient bandwidth is available for EIGRP and lastly we need to make sure that the routes are not in stuck-in-active state by decreasing the query scope with some techniques named as summarization, use of distribute-lists and defining routers as stub-routers.

RESULTS
In this section we have stated the results of our network after configuring EIGRP network with MD5 authentication as shown below.

Fig 3
We can see the above figure clearly shows that it is configured by MD5 authentication which shows “EIGRP: Received packet with MD5 authentication, key id = 1” by entering command “debug eigrp packets”.

CONCLUSION
Our outcome is to protect the receiver from irrelevant or false data/routing messages sent by the sender and to provide accurate/updated data.
We have research about what is EIGRP and how to implement and configure MD5 authentication in EIGRP.
Enhanced Interior Gateway Routing Protocol is a distance vector routing protocol. EIGRP only supports Message Digest 5 (MD5) authentication to prevent malicious and incorrect routing information.
By default no authentication is used for EIGRP packets. We can configure EIGRP to use MD5 authentication.
When EIGRP authentication is configured on router, the source of each routing packets get updates when it receives.
The MD5 in EIGRP prevents unauthorized of false routing messages from non relevant sources.
To authenticate MD5 in EIGRP we need to configure a authenticating key and Id on both side i:e sending router and receiving router. Each key has his own unique Id and is stored locally. The combination of each key Id associated with message is used to identify and authenticate algorithm.
EIGRP without Authentication
EIGRP message authentication ensures that routers only accept routing messages from other routers that know the same pre-shared key. Without authentication configured, if an unauthorized person introduces another router with different or conflicting route information on the network, the routing tables on the legitimate routers can become corrupt and a DoS attack may ensue.
EIGRP with Authentication
When authentication is added to the EIGRP messages sent between routers, it prevents someone from purposely, or accidentally, adding another router to the network and causing a problem.
EIGRP supports routing protocol authentication using MD5. The configuration of EIGRP message authentication consists of two steps: the creation of a keychain and key, and the configuration of EIGRP authentication to use that keychain and key.

Literature Review:-
We are using internet as our major source for our project research as we can find many articles related to our project posted by experts.
A Routing protocol is a formula used by a router to determine the appropriate path to transfer the data over the network, there are various types of routing protocol that are Used. Different Routing Protocols have their different algorithms and capabilities to transfer and encrypt the data.
EIGRP: Enhanced Interior Gateway Routing Protocol is a distance vector routing protocol. EIGRP only supports Message Digest 5 (MD5) authentication to prevent malicious and incorrect routing information.
https://www.cisco.com/c/en/us/support/docs/ip/enhanced-interior-gateway-routing-protocol-eigrp/82110-eigrp-authentication.html
http://www.ciscopress.com/articles/article.asp?p=687478&seqNum=4
Benefits:-
• By using MD5 authentication the network is more secure because it is encrypted by hash algorithm.
• Another benefit of MD5 authentication is that it does not harm the operation which is performed on routing table.
• Low error rate.
• Ease of deployment.
• Fast convergence.
• Supports multiple Network layer protocols like IPv4, IPv6, IPX, etc.
Methods:-
In this project we are going to implement and configure MD5 authentication in EIGRP by Cisco packet tracer simulator to provide advance security and prevent unauthorized routing message from sending source.

In our project there are Stakeholders, Clients, Management, and Coordinator are involved.

We will be implementing our project design in simulator Cisco packet tracer and work on our weekly tasks which are given by our coordinator.

REFRENCES
• https://www.networkworld.com/article/2283765/lan-wan/chapter-9–eigrp.html
• https://www.cisco.com/c/en/us/support/docs/ip/enhanced-interior-gateway-routing-protocol-eigrp/13669-1.html
• https://searchsecurity.techtarget.com/definition/authentication-authorization-and-accounting
• https://www.cisco.com/c/en/us/support/docs/ip/enhanced-interior-gateway-routing-protocol-eigrp/82110-eigrp-authentication.html#authentication
• https://www.cisco.com/c/en/us/support/docs/ip/enhanced-interior-gateway-routing-protocol-eigrp/82110-eigrp-authentication.html
• http://www.ciscopress.com/articles/article.asp?p=687478&seqNum=4
• http://www.ciscopress.com/articles/article.asp?p=687478&seqNum=4
• https://www.cisco.com/c/en/us/support/docs/ip/enhanced-interior-gateway-routing-protocol-eigrp/82110-eigrp-authentication.html