cisco eigrp authentication key-string

Posted on 2014-02-26
Medium Priority
Last Modified: 2014-03-03
We just adquired a new router (cisco 2900 series) to replace another router (Router 1). In router 1 we have eigrp authentication with a key-string encrypted (i.e 7 15005b19107939) because the vendor router uses eigrp authentication. Router 1 is connected to this vendor router. My question is do i need to get the key-string word that they used in their router or can we  just generate our  own key-string when we setup the new router.
Question by:Shen

Accepted Solution

ffleisma earned 2000 total points
ID: 39889472
you need to match the key string for the peer router.

you can try using the following command and see if shows the current encrypted key

more system:running-config

if it doesnt you'll need to ask your peer or the current peer key or replace both sides with a new key

Author Closing Comment

ID: 39900176
Thnak you

Featured Post

We Need Your Input!

WatchGuard is currently running a beta program for our new macOS Host Sensor for our Threat Detection and Response service. We're looking for more macOS users to help provide insight and feedback to help us make the product even better. Please sign up for our beta program today!

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

This article is in response to a question (http://www.experts-exchange.com/Networking/Network_Management/Network_Analysis/Q_28230497.html) here at Experts Exchange. The Original Poster (OP) requires a utility that will accept a list of IP addresses …
As companies replace their old PBX phone systems with Unified IP Communications, many are finding out that legacy applications such as fax do not work well with VoIP. Fortunately, Cloud Faxing provides a cost-effective alternative that works over an…
In this video we outline the Physical Segments view of NetCrunch network monitor. By following this brief how-to video, you will be able to learn how NetCrunch visualizes your network, how granular is the information collected, as well as where to f…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…

607 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question