Solved

hierarchical topology md5 authentication query

Posted on 2013-10-24
6
273 Views
Last Modified: 2013-10-25
hi i wish to know if my (md5 authentication) is correct and if not what is missing ?

note: apologies for not labelling up interface ports to know what connects to what as below describes:

i have configured the following:

core - only configured for routing protocol

dist1 - vtp server/rootbridge - 4096 & hsrp priority 200 active
dist1 - connects to access1 & 2

dist2 - vtp server/2nd root - 8192 & hsrp priority 100 standby
dist2 - connects to access 2 & 1

as per diagram
HIERACHICAL-TOPOLOGY-001.jpg
HSRP-MD5-AUTHENTICATION.docx
0
Comment
Question by:mikey250
  • 3
  • 3
6 Comments
 
LVL 26

Accepted Solution

by:
Soulja earned 500 total points
Comment Utility
Looks correct to me.
0
 

Author Comment

by:mikey250
Comment Utility
hi soulja, thanks for that as this is what i was going to add to my dest1 & dest2 on other thread.

one thing i have never really understood is when i see the following but see (key 1 & key 2) for example  ?

key chain michael
key 1
key 2
key-string 234
0
 
LVL 26

Assisted Solution

by:Soulja
Soulja earned 500 total points
Comment Utility
The above should have a key string for each key id.

I believe when you have one switch configured with multiple keyid and strings, the other switch can be configured with either of the key strings.
0
Free Trending Threat Insights Every Day

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

 

Author Comment

by:mikey250
Comment Utility
ok thanks for that!

i have just noticed that i would not be using (standby 2) in my config on that other thread you advised me on.  so i will remove it.
0
 
LVL 26

Expert Comment

by:Soulja
Comment Utility
Cool
0
 

Author Closing Comment

by:mikey250
Comment Utility
thanks for confirming my config was correct and the advice!
0

Featured Post

Maximize Your Threat Intelligence Reporting

Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
SSL RA VPN 7 72
Configure QoS on Archer c9 running WR-DDT 2 42
Comms between vlans via router 2 22
Need a cheap RFID setup 10 38
This article is focussed on erradicating the confusion with slash notations. This article will help you identify and understand the purpose and use of slash notations. A deep understanding of this will help you identify networks quicker especially w…
Hello to you all, I hear of many people congratulate AWS (Amazon Web Services) on how easy it is to spin up and create new EC2 (Elastic Compute Cloud) instances, but then fail and struggle to connect to them using simple tools such as SSH (Secure…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now