Expired authentication keys

We all know that authentication should be implemented between peers when using a routing protocol. Better still, instead of using a single static key a key-chain should be used so that they can be automatically rotated and via automation you can keep removing and adding keys to the chain to keep the endless cycle going.... Continue Reading →

Blog at WordPress.com.

Up ↑