Which key chain is being used for authentication of EIGRP adjacency between R4 and R2?

You have been asked to evaluate how EIGRP is functioning in a customer network.

Which key chain is being used for authentication of EIGRP adjacency between R4 and R2?

You have been asked to evaluate how EIGRP is functioning in a customer network.

Which key chain is being used for authentication of EIGRP adjacency between R4 and R2?

A.
CISCO

B.
EIGRP

C.
key

D.
MD5

Explanation:
R4 and R2 configs are as shown below:

Clearly we see the actual key chain is named CISCO.



Leave a Reply 1

Your email address will not be published. Required fields are marked *

nineteen − 18 =


Clyde

Clyde

R4# show key chain

This command will show you if you don’t have access to “show run”