Simulation 7
Refer to the exhibit.
R1
key chain AUTH_ISIS
key 2
key-string C1sco!
exit
int range et0/0 , et1/0
isis authen key-chain AUTH_ISIS
ip isis
isis metric 15
Copy run start
R2
key chain AUTH_ISIS
key 2
key-string C1sco!
exit
int range et0/0 , et1/0
isis authen key-chain AUTH_ISIS
ip isis
isis metric 20
Copy run start
R3
key chain AUTH_ISIS
key 2
key-string C1sco!
exit
int range et0/0 , et1/0
isis authen key-chain AUTH_ISIS
ip isis
isis metric 25
Copy run start
Lauryn
3 months agoGearldine
3 months agoJulianna
4 months agoLeontine
4 months agoLauryn
4 months agoArmando
4 months agoEarleen
4 months agoToi
5 months agoArmando
5 months agoEarleen
5 months agoArmando
5 months agoAlona
6 months agoEttie
6 months agoTitus
6 months agoMonte
5 months agoGearldine
5 months agoMonte
5 months agoVenita
6 months ago