
CE-PE Routing Security Best Practices 183
that MD5 authentication be used between PEs and CEs that utilize dynamic protocols.
If, however, this is not acceptable in a given environment, there is still a need to control the
peering associations. Within BGP, this is inherently accomplished through the “neighbor”
construct.
When EIGRP or RIP implemented, this functionality is not yet available for PE-CE
interfaces. Without MD5, the only protection against unwanted routes would be the
autonomous system numbers, which is a very weak mechanism from a protection
perspective. In this environment, the distance command may be used to control acceptable ...