hierarchical topology md5 authentication query

Posted on 2013-10-24
Medium Priority
Last Modified: 2013-10-25
hi i wish to know if my (md5 authentication) is correct and if not what is missing ?

note: apologies for not labelling up interface ports to know what connects to what as below describes:

i have configured the following:

core - only configured for routing protocol

dist1 - vtp server/rootbridge - 4096 & hsrp priority 200 active
dist1 - connects to access1 & 2

dist2 - vtp server/2nd root - 8192 & hsrp priority 100 standby
dist2 - connects to access 2 & 1

as per diagram
Question by:mikey250
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 3
LVL 26

Accepted Solution

Soulja earned 2000 total points
ID: 39599150
Looks correct to me.

Author Comment

ID: 39599767
hi soulja, thanks for that as this is what i was going to add to my dest1 & dest2 on other thread.

one thing i have never really understood is when i see the following but see (key 1 & key 2) for example  ?

key chain michael
key 1
key 2
key-string 234
LVL 26

Assisted Solution

Soulja earned 2000 total points
ID: 39600026
The above should have a key string for each key id.

I believe when you have one switch configured with multiple keyid and strings, the other switch can be configured with either of the key strings.
Microsoft Certification Exam 74-409

Veeam® is happy to provide the Microsoft community with a study guide prepared by MVP and MCT, Orin Thomas. This guide will take you through each of the exam objectives, helping you to prepare for and pass the examination.


Author Comment

ID: 39600061
ok thanks for that!

i have just noticed that i would not be using (standby 2) in my config on that other thread you advised me on.  so i will remove it.
LVL 26

Expert Comment

ID: 39600138

Author Closing Comment

ID: 39600331
thanks for confirming my config was correct and the advice!

Featured Post

Get your Conversational Ransomware Defense e‑book

This e-book gives you an insight into the ransomware threat and reviews the fundamentals of top-notch ransomware preparedness and recovery. To help you protect yourself and your organization. The initial infection may be inevitable, so the best protection is to be fully prepared.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In the world of WAN, QoS is a pretty important topic for most, if not all, networks. Some WAN technologies have QoS mechanisms built in, but others, such as some L2 WAN's, don't have QoS control in the provider cloud.
Quality of Service (QoS) options are nearly endless when it comes to networks today. This article is merely one example of how it can be handled in a hub-n-spoke design using a 3-tier configuration.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Suggested Courses

764 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question