Solved

cisco eigrp authentication key-string

Posted on 2014-02-26
2
243 Views
Last Modified: 2014-03-03
We just adquired a new router (cisco 2900 series) to replace another router (Router 1). In router 1 we have eigrp authentication with a key-string encrypted (i.e 7 15005b19107939) because the vendor router uses eigrp authentication. Router 1 is connected to this vendor router. My question is do i need to get the key-string word that they used in their router or can we  just generate our  own key-string when we setup the new router.
0
Comment
Question by:Shen
2 Comments
 
LVL 9

Accepted Solution

by:
ffleisma earned 500 total points
ID: 39889472
you need to match the key string for the peer router.

you can try using the following command and see if shows the current encrypted key

more system:running-config

if it doesnt you'll need to ask your peer or the current peer key or replace both sides with a new key
0
 

Author Closing Comment

by:Shen
ID: 39900176
Thnak you
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

As companies replace their old PBX phone systems with Unified IP Communications, many are finding out that legacy applications such as fax do not work well with VoIP. Fortunately, Cloud Faxing provides a cost-effective alternative that works over an…
Is your computer hacked? learn how to detect and delete malware in your PC
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

760 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now