Attention:
1, in the CCNP Learning Guide P91 Page said key-string the first character can not be a number, but the experimental results can be used as a pure digital password!
2, the name behind the key chain only valid locally, the routers can not be consistent.
3, key ID must be globally consistent, otherwise the certification is not successful, in each EIGRP package contains the value, you can grab the bag to see the carrying key ID.
4, key-string is the password, must be consistent.
5, EIGRP authentication must be in the boot authentication of all the interfaces to maintain consistency, can not say that some of the interface to use another key chain. I remember that OSPF can use different key chain based on different interfaces.
Key chain, understood as a key to the definition of the ring, think of the dormitory, the hostel is not holding a large set of keys to open rounds, the key is buttoned in a ring, hehe. But it can have multiple key rings, a bunch of boys dormitory, a bunch of girls dormitory (convenient key management and use) ... Therefore, the key chain can be defined multiple.
Key ID, understood as a key, a key ring can hang multiple keys, therefore, key chain can define multiple key IDs
Key string, understood to be defined on the key to the concave and convex teeth pattern, you go to match a key, the tooth pattern is very critical, and can be defined as modified.
Accordingly, the corresponding tooth pattern on the key is able to open the corresponding door! Corresponds to: Key ID and key string must be consistent with each other to be able to successfully authenticate!
The above content from: http://bbs.clnchina.com.cn/thread-27068-1-1.html Thank the original author diligently finishing
1. Topology map
2. After the configuration completes EIGRP, view each router's neighbor table, the topology table and the routing table
A.