Solved

cisco eigrp authentication key-string

Posted on 2014-02-26
2
250 Views
Last Modified: 2014-03-03
We just adquired a new router (cisco 2900 series) to replace another router (Router 1). In router 1 we have eigrp authentication with a key-string encrypted (i.e 7 15005b19107939) because the vendor router uses eigrp authentication. Router 1 is connected to this vendor router. My question is do i need to get the key-string word that they used in their router or can we  just generate our  own key-string when we setup the new router.
0
Comment
Question by:Shen
2 Comments
 
LVL 9

Accepted Solution

by:
ffleisma earned 500 total points
ID: 39889472
you need to match the key string for the peer router.

you can try using the following command and see if shows the current encrypted key

more system:running-config

if it doesnt you'll need to ask your peer or the current peer key or replace both sides with a new key
0
 

Author Closing Comment

by:Shen
ID: 39900176
Thnak you
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Monitoring IBM System x through PRTG 7 132
Monitoring Software: Which is best? 9 94
wall mount rack -- recommendation ? 3 90
Network PC shutdown automation ? 3 24
I was at a customer and we recently set up a new DNS Server.  I asked him to ensure that all servers pointed to the new server.  140 remote servers – estimated 6 days of work to do this manually. Ever had this experience and just need to get the …
This article is in response to a question (http://www.experts-exchange.com/Networking/Network_Management/Network_Analysis/Q_28230497.html) here at Experts Exchange. The Original Poster (OP) requires a utility that will accept a list of IP addresses …
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

825 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question