Simulation 7
Refer to the exhibit.
R1
key chain AUTH_ISIS
key 2
key-string C1sco!
exit
int range et0/0 , et1/0
isis authen key-chain AUTH_ISIS
ip isis
isis metric 15
Copy run start
R2
key chain AUTH_ISIS
key 2
key-string C1sco!
exit
int range et0/0 , et1/0
isis authen key-chain AUTH_ISIS
ip isis
isis metric 20
Copy run start
R3
key chain AUTH_ISIS
key 2
key-string C1sco!
exit
int range et0/0 , et1/0
isis authen key-chain AUTH_ISIS
ip isis
isis metric 25
Copy run start
Lauryn
10 months agoGearldine
10 months agoJulianna
10 months agoLeontine
11 months agoLauryn
11 months agoArmando
11 months agoEarleen
11 months agoToi
12 months agoArmando
12 months agoEarleen
1 years agoArmando
1 years agoAlona
1 years agoEttie
1 years agoTitus
1 years agoMonte
1 years agoGearldine
1 years agoMonte
1 years agoVenita
1 years ago