Configure an authentication key on a key chain. Rationale: This is part of the routing authentication setup Impact: Organizations should plan and implement enterprise security policies that require rigorous authentication methods for routing protocols. Configuring the proper authentication 'key' for RIPv2 protocols enforces these policies by restricting acceptable authentication between network devices.
Solution
Configure the key number. hostname(config-keychain)#key {<em>key-number</em>}