From: Gupta, Gopal (NWCC) (gopal.gupta@hp.com)
Date: Sun Nov 11 2007 - 10:10:10 ART
As far as I know, for different keys to authenticate we need to go for
PPPoFR.
HTH
Gops
-----Original Message-----
From: nobody@groupstudy.com [mailto:nobody@groupstudy.com] On Behalf Of
Bhaskar Sivanesan
Sent: Sunday, November 11, 2007 18:35
To: ccie forum
Subject: Authentication keys
Importance: Low
Hi Group
Hows the authentication keys in key-chains are managed...... like if I
have 2 keys in a a key chain, will the authentication process go
sequentiallly, till the authentication succeeds...
My scenario is , I have R1 with a mulitpoint sub-interface terminating
at R2 and R3. RIP is enabled among these three and different keys have
to be used by R1 for authentication with R2 and R3. I tried the below
config, but authentication with R3 fails. i.e R3 receives update from R1
and ignores, stating invalid authentication. however R1 receives updates
from R3 and accepts them.
any suggestions???
R1 -config
----------------
key chain r1tor2
key 1
key-string ipexpert_R1toR2
key 2
key-string ipexpert_R1toR3
R2 config
-------------
key chain r1tor2
key 1
key-string ipexpert_R1toR2
R3 config
-------------
key chain r1tor3
key 2
key-string ipexpert_R1toR3
Thanks
Bhaskar
This archive was generated by hypermail 2.1.4 : Sat Dec 01 2007 - 06:37:29 ART