Simulation 7
Refer to the exhibit.
R1
key chain AUTH_ISIS
key 2
key-string C1sco!
exit
int range et0/0 , et1/0
isis authen key-chain AUTH_ISIS
ip isis
isis metric 15
Copy run start
R2
key chain AUTH_ISIS
key 2
key-string C1sco!
exit
int range et0/0 , et1/0
isis authen key-chain AUTH_ISIS
ip isis
isis metric 20
Copy run start
R3
key chain AUTH_ISIS
key 2
key-string C1sco!
exit
int range et0/0 , et1/0
isis authen key-chain AUTH_ISIS
ip isis
isis metric 25
Copy run start
Lauryn
12 months agoGearldine
1 years agoJulianna
1 years agoLeontine
1 years agoLauryn
1 years agoArmando
1 years agoEarleen
1 years agoToi
1 years agoArmando
1 years agoEarleen
1 years agoArmando
1 years agoAlona
1 years agoEttie
1 years agoTitus
1 years agoMonte
1 years agoGearldine
1 years agoMonte
1 years agoVenita
1 years ago