Simulation 7
Refer to the exhibit.
R1
key chain AUTH_ISIS
key 2
key-string C1sco!
exit
int range et0/0 , et1/0
isis authen key-chain AUTH_ISIS
ip isis
isis metric 15
Copy run start
R2
key chain AUTH_ISIS
key 2
key-string C1sco!
exit
int range et0/0 , et1/0
isis authen key-chain AUTH_ISIS
ip isis
isis metric 20
Copy run start
R3
key chain AUTH_ISIS
key 2
key-string C1sco!
exit
int range et0/0 , et1/0
isis authen key-chain AUTH_ISIS
ip isis
isis metric 25
Copy run start
Lauryn
6 months agoGearldine
6 months agoJulianna
6 months agoLeontine
6 months agoLauryn
6 months agoArmando
6 months agoEarleen
6 months agoToi
7 months agoArmando
7 months agoEarleen
7 months agoArmando
7 months agoAlona
8 months agoEttie
8 months agoTitus
8 months agoMonte
8 months agoGearldine
8 months agoMonte
8 months agoVenita
8 months ago