hierarchical topology md5 authentication query

Posted on 2013-10-24
Last Modified: 2013-10-25
hi i wish to know if my (md5 authentication) is correct and if not what is missing ?

note: apologies for not labelling up interface ports to know what connects to what as below describes:

i have configured the following:

core - only configured for routing protocol

dist1 - vtp server/rootbridge - 4096 & hsrp priority 200 active
dist1 - connects to access1 & 2

dist2 - vtp server/2nd root - 8192 & hsrp priority 100 standby
dist2 - connects to access 2 & 1

as per diagram
Question by:mikey250
  • 3
  • 3
LVL 26

Accepted Solution

Soulja earned 500 total points
ID: 39599150
Looks correct to me.

Author Comment

ID: 39599767
hi soulja, thanks for that as this is what i was going to add to my dest1 & dest2 on other thread.

one thing i have never really understood is when i see the following but see (key 1 & key 2) for example  ?

key chain michael
key 1
key 2
key-string 234
LVL 26

Assisted Solution

Soulja earned 500 total points
ID: 39600026
The above should have a key string for each key id.

I believe when you have one switch configured with multiple keyid and strings, the other switch can be configured with either of the key strings.
Control application downtime with dependency maps

Visualize the interdependencies between application components better with Applications Manager's automated application discovery and dependency mapping feature. Resolve performance issues faster by quickly isolating problematic components.


Author Comment

ID: 39600061
ok thanks for that!

i have just noticed that i would not be using (standby 2) in my config on that other thread you advised me on.  so i will remove it.
LVL 26

Expert Comment

ID: 39600138

Author Closing Comment

ID: 39600331
thanks for confirming my config was correct and the advice!

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Introduction This article explores the design of a cache system that can improve the performance of a web site or web application.  The assumption is that the web site has many more “read” operations than “write” operations (this is commonly the ca…
In the world of WAN, QoS is a pretty important topic for most, if not all, networks. Some WAN technologies have QoS mechanisms built in, but others, such as some L2 WAN's, don't have QoS control in the provider cloud.
After creating this article (, I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (, I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

948 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

22 Experts available now in Live!

Get 1:1 Help Now