Details
Configure an authentication key on a key chain.
Rationale:
This is part of the routing authentication setup
Impact:
Organizations should plan and implement enterprise security policies that require rigorous authentication methods for routing protocols. Configuring the proper authentication ‘key’ for RIPv2 protocols enforces these policies by restricting acceptable authentication between network devices.
Solution
Configure the key number.
hostname(config-keychain)#key {key-number}
Supportive Information
The following resource is also helpful.
This security hardening control applies to the following category of controls within NIST 800-53: Identification and Authentication.This control applies to the following type of system Cisco.