We have had a security scan completed on our solaris 10 systems and several of them came back with "This host is running a RIP-2 agent. RIP-2 requests can be authenticated"
How do i verify that it is using authentication? Or see if it is running RIP-2 at all.