This appears to have worked as my neighbor adjacancies re-established and I have full connectivity. But I am not sure whether this 2nd method is WRONG!! or whether this is just another way to configure MD5 authentication.
Was hoping some of the more knowledgeable guy's on here could explain any differences in the 2 configuration methods.
I do notice from running the "debug ip ospf packet" command that the output is slightly different depending on which method is used.
*** Dubug output when using study guide method ***
As per my knowledge both methods are correct!!!! the only thing is when you use message-digest-key you are doing MD5 authentication, where as when you are using simple suthentication-key clear text authentication is taking place.
Lets hear more from the experts. Correct me if i am wrong.
In your first config you hv enabled authentication(type 1 u can verify in debug aut:1) & key which you hv provided is for MD5 authentication.
In your second config you hv enabled MD5 authentication(type 2 u can verify in debug aut:2) & key which u hv provided by cmd (ip ospf authentication-key 1 ccnp)is for clear-text authentication.u can verify this in second debug o/p keyid is 0 (Mar 1 01:33:38.483: OSPF: rcv. v:2 t:1 l:52 rid:22.214.171.124
aid:0.0.0.0 chk:0 aut:2 keyid:0 seq:0x3C7EDA30 from Serial1/0 )
What my understanding is unless and until you specify the message-digest key the "ip ospf authentication message-disest" command will not take place. (It will authenticate over clear-text key provided).
So basically there are 3 methods for authentication:
Shrikar is absouletly right only small correction there are only 2 types of authentication clear text and md5. OSPF supports both while eigrp supports only supports md5.Shrikar its good to see you back in business.
Please refer mazhar's post which is very useful. Mazhar you deserve rating.
Hi everyone, I would like to thank you in advance for any help you can provide a newcomer like myself!
Im studying the 100-105 book by Odom and am currently on the topic of Port security. I purchased a used 2960 and I'm trying to follow a...
While deploying a number of 18xx/2802/3802 model access points (APs), which run AP-COS as their operating platform. It can be observed on some occasions that while many of their access points were able to join the fabric WLC withou...
I am going to design and build an LAN network under a tunnel underground with long distance between the switches.
I will have 2 Catalyst switches and 8 Industrial IE3000, and they will be connected with fiber.
For now I am planning on use Layer-2 s...