API Guide

ipsec spi number Enter a unique security policy index (SPI) value, from 256 to 4294967295.
md5 Enable message digest 5 (MD5) authentication.
sha1 Enable secure hash algorithm 1 (SHA1) authentication.
key Enter the text string used in the authentication type. All OSPFv3 routers in the area share the key to exchange
information. Only a non-encrypted key is supported. For MD5 authentication, the non-encrypted key must be 32 plain hex
digits. For SHA1 authentication, the non-encrypted key must be 40 hex digits. An encrypted key is not supported.
To delete an IPsec area authentication policy, use the no area area-id authentication ipsec spi number
command.
Configure IPsec authentication for an OSPfv3 area
OS10(config-router-ospfv3-100)# area 1 authentication ipsec spi 400 md5
12345678123456781234567812345678
OS10(config-router-ospfv3-100)# show configuration
!
router ospfv3 100
area 0.0.0.1 authentication ipsec spi 400 md5 12345678123456781234567812345678
IPsec encryption for OSPV3 area
Prerequisite: Before you enable IPsec encryption for an OSPFv3 area, first enable OSPFv3 globally on the router.
When you configure encryption at the area level, both IPsec encryption and authentication are enabled. You cannot configure
encryption if you have already configured an IPsec area authentication using the area ospf authentication ipsec
command. To configure encryption, you must first delete the authentication policy.
Enable IPsec encryption for OSPFv3 packets in an area in Router-OSPFv3 mode.
area area-id encryption ipsec spi number esp encryption-type key
authentication-type key
area area-id Enter an area ID as a number or IPv6 prefix.
ipsec spi number Enter a unique security policy index (SPI) value, from 256 to 4294967295.
esp encryption-type Enter the encryption algorithm used with ESP (3DES, DES, AES-CBC, or NULL). For AES-
CBC, only the AES-128 and AES-192 ciphers are supported.
key Enter the text string used in the encryption algorithm. All neighboring OSPFv3 routers must share the key to
decrypt information. Only a non-encrypted key is supported. Required lengths of the non-encrypted key are: 3DES 48
hex digits; DES 16 hex digits; AES-CBC 32 hex digits for AES-128 and 48 hex digits for AES-192.
authentication-type Enter the encryption authentication MD5 or SHA1 algorithm to use.
key Enter the text string used in the authentication algorithm. All neighboring OSPFv3 routers must share the key to
exchange information. Only a non-encrypted key is supported. For MD5 authentication, the non-encrypted key must be
32 plain hex digits. For SHA1 authentication, the non-encrypted key must be 40 hex digits. An encrypted key is not
supported.
To delete an IPsec encryption policy, use the no area area-id encryption ipsec spi number command.
Configure IPsec encryption for OSPFv3 area
OS10(config-router-ospfv3-100)# area 1 encryption ipsec spi 401 esp des 1234567812345678
md5
12345678123456781234567812345678
OS10(config-router-ospfv3-100)# show configuration
!
router ospfv3 100
area 0.0.0.1 encryption ipsec spi 401 esp des 1234567812345678 md5
12345678123456781234567812345678
Troubleshoot OSPFv3
You can troubleshoot OSPFv3 operations and check questions for typical issues that interrupt a process.
Is OSPFv3 enabled globally?
Is OSPFv3 enabled on the interface?
730
Layer 3