Solved

cisco eigrp authentication key-string

Posted on 2014-02-26
2
255 Views
Last Modified: 2014-03-03
We just adquired a new router (cisco 2900 series) to replace another router (Router 1). In router 1 we have eigrp authentication with a key-string encrypted (i.e 7 15005b19107939) because the vendor router uses eigrp authentication. Router 1 is connected to this vendor router. My question is do i need to get the key-string word that they used in their router or can we  just generate our  own key-string when we setup the new router.
0
Comment
Question by:Shen
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 9

Accepted Solution

by:
ffleisma earned 500 total points
ID: 39889472
you need to match the key string for the peer router.

you can try using the following command and see if shows the current encrypted key

more system:running-config

if it doesnt you'll need to ask your peer or the current peer key or replace both sides with a new key
0
 

Author Closing Comment

by:Shen
ID: 39900176
Thnak you
0

Featured Post

PeopleSoft Has Never Been Easier

PeopleSoft Adoption Made Smooth & Simple!

On-The-Job Training Is made Intuitive & Easy With WalkMe's On-Screen Guidance Tool.  Claim Your Free WalkMe Account Now

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Setting up SSH Cisco We are all told that you should not use Telent for connecting to devices because it is unsecure and all clear text. Much better is to use SSH, but it can seem a bit of a challenge setting it all up and especially in a small n…
This article is in response to a question (http://www.experts-exchange.com/Networking/Network_Management/Network_Analysis/Q_28230497.html) here at Experts Exchange. The Original Poster (OP) requires a utility that will accept a list of IP addresses …
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…

717 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question