it said that 1 auth packet is sent, and the keys are examined from low to high and the first valid key that is encountered its used,,, but RA is not authenticating !!! why ??? when it receives the packet from B it will ignore key 1 since A doesnot have it but why not its accepting key 2 ???? plz some1 help me
sorry but i didnt get it, u said one key can be sent at a time while i can receive multi keys at the same time ??? how can i receive when multi keys while a router can send 1 at a time ??? in my case key 1 was sent first right which was not valid for RtrB, so wat will happen next ?? key 2 will be sent right ??? i m confused plz explain it
"Router A will accept and attempt to verify the MD5 digest of any EIGRP packet with a key equal to 1. It will also accept a packet with a key equal to 2. All other MD5 packets will be dropped. Router A will send all EIGRP packets with key 2.
Router B will accept key 1 or key 2, and will use key 1 to send MD5 authentication, since key 1 is the first the first valid key off the key-chain. Key 1 will no longer be valid to be used for sending after December 4, 2006. After this date, key 2 would be used to send MD5 authentication., since it is valid until January 4, 2007. "
You have to make key 1 on Router B invalid in order for Router A to receive key 2 from the chain. You can change this behavior by inserting a time in the past as the start and end time for key 1.
hi sorry edison i m not getting it, see this is how i have configured now,
key chain ciscoa
key chain ciscob
even now they r not authenticating but why ??? when key 1 is invalid why r they not agreeing upon key 2 ??? u said
"Router A will accept and attempt to verify the MD5 digest of any EIGRP packet with a key equal to 1. It will also accept a packet with a key equal to 2" so why dosent it accepting key 2 in my case ??? i know i m being stupid but i m really not getting it plz explain it
Hi everyone, I would like to thank you in advance for any help you can provide a newcomer like myself!
Im studying the 100-105 book by Odom and am currently on the topic of Port security. I purchased a used 2960 and I'm trying to follow a...
While deploying a number of 18xx/2802/3802 model access points (APs), which run AP-COS as their operating platform. It can be observed on some occasions that while many of their access points were able to join the fabric WLC withou...
I am going to design and build an LAN network under a tunnel underground with long distance between the switches.
I will have 2 Catalyst switches and 8 Industrial IE3000, and they will be connected with fiber.
For now I am planning on use Layer-2 s...