A customer is concerned about rerouting attacks on the IS-IS domain spanning the company. Which keychain management configuration is valid to authenticate
IS-IS link-state information and provide a first response to this type of attack for Cisco IOS XR instances?
Comments