RE: Authentication keys

From: Gupta, Gopal (NWCC) (gopal.gupta@hp.com)
Date: Sun Nov 11 2007 - 10:10:10 ART


As far as I know, for different keys to authenticate we need to go for
PPPoFR.

HTH
Gops

-----Original Message-----
From: nobody@groupstudy.com [mailto:nobody@groupstudy.com] On Behalf Of
Bhaskar Sivanesan
Sent: Sunday, November 11, 2007 18:35
To: ccie forum
Subject: Authentication keys
Importance: Low

Hi Group

Hows the authentication keys in key-chains are managed...... like if I
have 2 keys in a a key chain, will the authentication process go
sequentiallly, till the authentication succeeds...

My scenario is , I have R1 with a mulitpoint sub-interface terminating
at R2 and R3. RIP is enabled among these three and different keys have
to be used by R1 for authentication with R2 and R3. I tried the below
config, but authentication with R3 fails. i.e R3 receives update from R1
and ignores, stating invalid authentication. however R1 receives updates
from R3 and accepts them.

any suggestions???

R1 -config
----------------
key chain r1tor2
 key 1
   key-string ipexpert_R1toR2
 key 2
   key-string ipexpert_R1toR3

R2 config
-------------
key chain r1tor2
 key 1
   key-string ipexpert_R1toR2

R3 config
-------------
key chain r1tor3
 key 2
   key-string ipexpert_R1toR3

Thanks
Bhaskar



This archive was generated by hypermail 2.1.4 : Sat Dec 01 2007 - 06:37:29 ART