Workflow: configure TCP enhanced authentication for NEs

Stages
 

Create a global key chain that contains at least one key; see How do I configure a global TCP key chain? .


Distribute the key chain to the NEs; see How do I distribute global key chains to NEs? .


Verify the distribution of a global key chain to the NEs; see How do I verify the distribution of a global key chain to NEs? .


Assign the key chain to a routing protocol, such as BGP or LDP.


If required, identify the differences between a global and local policy or two local key chains; see How do I identify differences between a global and local key chain policy or two local key chains? .