Administrator Guide

To enable both receiving and sending routing updates, use the no passive-interface interface command.
To indicate that hello packets are not transmitted on that interface, when you configure a passive interface, the show ipv6
ospf interface command adds the words passive interface.
Redistributing Routes
You can add routes from other routing instances or protocols to the OSPFv3 process.
With the redistribute command, you can include RIP, static, or directly connected routes in the OSPF process. Route
redistribution is also supported between OSPF Routing process IDs.
To add redistributing routes, use the following command.
Specify which routes are redistributed into the OSPF process.
CONF-IPV6-ROUTER-OSPF mode
redistribute {bgp | connected | static} [metric metric-value | metric-type type-value]
[route-map map-name] [tag tag-value]
Configure the following required and optional parameters:
bgp | connected | static: enter one of the keywords to redistribute those routes.
metric metric-value: The range is from 0 to 4294967295.
metric-type metric-type: enter 1 for OSPFv3 external route type 1 OR 2 for OSPFv3 external route type 2.
route-map map-name: enter a name of a configured route map.
tag tag-value: The range is from 0 to 4294967295.
Configuring a Default Route
To generate a default external route into the OSPFv3 routing domain, configure the following parameters.
To specify the information for the default route, use the following command.
Specify the information for the default route.
CONF-IPV6-ROUTER-OSPF mode
default-information originate [always [metric metric-value] [metric-type type-value]]
[route-map map-name]
Configure the following required and optional parameters:
always: indicate that default route information is always advertised.
metric metric-value: The range is from 0 to 4294967295.
metric-type metric-type: enter 1 for OSPFv3 external route type 1 OR 2 for OSPFv3 external route type 2.
route-map map-name: enter a name of a configured route map.
OSPFv3 Authentication Using IPsec
OSPFv3 uses OSPFv3 authentication using IP security (IPsec) to provide authentication for OSPFv3 packets. IPsec
authentication ensures security in the transmission of OSPFv3 packets between IPsec-enabled routers.
IPsec is a set of protocols developed by the internet engineering task force (IETF) to support secure exchange of packets at the
IP layer. IPsec supports two encryption modes: transport and tunnel.
Transport mode encrypts only the data portion (payload) of each packet, but leaves the header untouched.
Tunnel mode is more secure and encrypts both the header and payload. On the receiving side, an IPsec-compliant device
decrypts each packet.
NOTE: The system supports only Transport Encryption mode in OSPFv3 authentication with IPsec.
With IPsec-based authentication, Crypto images are used to include the IPsec secure socket application programming interface
(API) required for use with OSPFv3.
662
Open Shortest Path First (OSPFv2 and OSPFv3)