chapter  22
24 Pages

Configuring Neighbor Authentication and Other Security Features

In Chapter 5, “Router Management,” you learned about some tools to gather information about the routers directly connected to your router. You used Ping, Telnet, Traceroute, and the Cisco Discovery Protocol. You were gathering information about neighbors.