Workflow: configure TCP enhanced authentication for NEs
Stages
1 |
Create a global key chain that contains at least one key; see How do I configure a global TCP key chain? . |
2 |
Distribute the key chain to the NEs; see How do I distribute global key chains to NEs? . |
3 |
Verify the distribution of a global key chain to the NEs; see How do I verify the distribution of a global key chain to NEs? . |
4 |
Assign the key chain to a routing protocol, such as BGP or LDP. |
5 |
If required, identify the differences between a global and local policy or two local key chains; see How do I identify differences between a global and local key chain policy or two local key chains? . |