Re: EIGRP Neighbor command vs Authentication

From: rocco ****** (roccor21@hotmail.com)
Date: Tue May 09 2006 - 20:26:25 ART


Yeah, I guess the multicast would still be seen but they wouldn't be able
to establish a neighbor. Then again the question says intercept not
protect.

Thanks for everybody's comments...very helpful

  --------------------------------------------------------------------

  From: Bajo <bajoalex@gmail.com>
  To: "Plank, Jason" <JPlank@concordefs.com>
  CC: "rocco ******" <roccor21@hotmail.com>, ccielab@groupstudy.com
  Subject: Re: EIGRP Neighbor command vs Authentication
  Date: Tue, 9 May 2006 18:01:25 -0500
  MIME-Version: 1.0
  Received: from py-out-1112.google.com ([64.233.166.181]) by
  bay0-mc10-f12.bay0.hotmail.com with Microsoft SMTPSVC(6.0.3790.1830);
  Tue, 9 May 2006 16:01:27 -0700
  Received: by py-out-1112.google.com with SMTP id c30so1977437pyc for
  <roccor21@hotmail.com>; Tue, 09 May 2006 16:01:26 -0700 (PDT)
  Received: by 10.35.119.11 with SMTP id w11mr1517019pym; Tue, 09 May
  2006 16:01:25 -0700 (PDT)
  Received: by 10.35.128.12 with HTTP; Tue, 9 May 2006 16:01:25 -0700
  (PDT)

  Rocco, That what I did when I did the lab (authenticate). The
  neighbor solution given makes more sense. Am not sure if the
  authentication method stops other ends from "intercepting" the
  broadcast message. Understanding what they intercept may be
  impossible.

  On 5/9/06, Plank, Jason <JPlank@concordefs.com> wrote:

    I can see how both could be the right answer, but I guess the key
    here is
    that when you use the neighbor command it stops multicasting and
    starts
    unicasting.

    -------------------
    Jason Plank
    Network Engineer
    101 Bellevue Parkway
    Wilmington, DE 19809
    E-mail: JPlank@concordefs.com
    Phone: 302-793-5913

    -----Original Message-----
    From: nobody@groupstudy.com [mailto:nobody@groupstudy.com] On
    Behalf Of
    rocco ******
    Sent: Tuesday, May 09, 2006 6:44 PM
    To: ccielab@groupstudy.com
    Subject: EIGRP Neighbor command vs Authentication

    What is more appropriate? ......I don't want eigrp hosts running
    on the
    same VLAN to intercept EIGRP communications? I'm doing IEWB 4.5
    and
    answered it using MD5 auth but the answer key says to use the
    neighbor
    command? Am I wrong?

    _______________________________________________________________________
    Subscription information may be found at:
    http://www.groupstudy.com/list/CCIELab.html

    -----------------------------------------
    The information in this message may be proprietary and/or
    confidential, and protected from disclosure. If the reader of
    this
    message is not the intended recipient, or an employee or agent
    responsible for delivering this message to the intended
    recipient,
    you are hereby notified that any dissemination, distribution or
    copying of this communication is strictly prohibited. If you have
    received this communication in error, please notify First Data
    immediately by replying to this message and deleting it from your
    computer.

    _______________________________________________________________________
    Subscription information may be found at:
    http://www.groupstudy.com/list/CCIELab.html

  --
  Kind Regards,

  Bajo



This archive was generated by hypermail 2.1.4 : Thu Jun 01 2006 - 06:33:21 ART