Key Chains
Authentication is a very important security measure on our enterprises. Control plane protocols like NTP, OSPF, and EIGRP will use authentication controls to verify protocols connect to a non-malicious device. In the case of protocols like NTP, EIGRP and OSPF we can use "key-chains" to create Pre-Shared Keys globally on our device that we can use to authenticate between protocols/devices.
We can use key-chains to authenticate between our routing protocols, and we can rotate keys by implementing time based restrictions our on PSKs, in our key-chain.
In this guide we will configure a key-chain with different keys and different "lifetime" for the keys. This will demonstrate how we can "roll" keys.

Configuration
Full configuration is shown below

Verification

Last updated