Professional Documents
Culture Documents
AUTHENTICATIO
N
April 23, 2016
KEY CHAIN
Group of managed passwords
Key chain <name>
Key <number>
Key-string <password>
Accept-lifetime (optional)
Send-lifetime (optional)
KEY CHAIN
KEY LIFETIME
EXAMPLE TOPOLOGY
COMBINED
VERIFICATION
show ip eigrp neighbors
Verify that neighbor adjacencies have formed
VERIFICATION
debug eigrp packets
This will let you know why the authentication fails
VERIFICATION
If key numbers dont match