Details
Configure an authentication key on a key chain.
Rationale:
This is part of the routing authentication setup
Impact:
Organizations should plan and implement enterprise security policies that require rigorous authentication methods for routing protocols. Using ‘key numbers’ for key chains for routing protocols enforces these policies.
Solution
Configure the key number.
hostname(config-keychain)#key {key-number}
Supportive Information
The following resource is also helpful.
This security hardening control applies to the following category of controls within NIST 800-53: Identification and Authentication.This control applies to the following type of system Cisco.