Information
To be effective, route authentication needs to be configured across the entire routing domain with every peer router. Even though the authentication keys are stored in a cryptographically obscured form in the Junos configuration, steps should be taken to restrict which engineers can view them.
NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.
Solution
Review the authentication keys used on the routing protocols and verify the different keys are used for each protocol.