White Papers

Table Of Contents
Defaults 40 seconds (Ethernet).
Command Modes INTERFACE
Command
History
This guide is platform-specific. For command information about other platforms, see the relevant Dell
EMC Networking OS Command Line Reference Guide.
Version Description
9.10(0.1) Introduced on the S6010-ON and S4048T-ON.
9.10(0.0) Introduced on the S3148.
9.10(0.0) Introduced on the S6100-ON.
9.8(2.0) Introduced on the S3100 series.
9.8(1.0) Introduced on the Z9100-ON.
9.8(0.0P5) Introduced on the S4048-ON.
9.8(0.0P2) Introduced on the S3048-ON.
9.2(1.0) Introduced on the Z9500.
9.1.(0.0) Introduced on the S4810 and Z9000.
7.8.1.0 Added support for C-Series.
7.4.1.0 Introduced on the E-Series.
8.3.19.0 Introduced on the S4820T.
Usage
Information
By default, the dead interval is four times longer than the default hello-interval.
Related
Commands
ipv6 ospf hello-interval specify the time interval between hello packets.
ipv6 ospf encryption
Configure an IPsec encryption policy for OSPFv3 packets on an IPv6 interface.
Syntax
ipv6 ospf encryption {null | ipsec spi number esp encryption-algorithm
[key-encryption-type] key athentication-algorithm [key-encryption-type]
key}}
Parameters
null Causes an encryption policy configured for the area to not be inherited on the
interface.
ipsec spi number
Security Policy index (SPI) value that identifies an IPsec security policy. The range
is from 256 to 4294967295.
esp
encryption-
algorithm
Encryption algorithm used with ESP.
Valid values are: 3DES, DES, AES-CBC, and NULL.
For AES-CBC, only the AES-128 and AES-192 ciphers are supported.
key-encryption-
type
(OPTIONAL) Specifies if the key is encrypted.
Valid values: 0 (key is not encrypted) or 7 (key is encrypted).
key
Text string used in authentication.
The required lengths of a non-encrypted or encrypted key are:
3DES - 48 or 96 hex digits; DES - 16 or 32 hex digits; AES-CBC -32 or 64 hex digits
for AES-128 and 48 or 96 hex digits for AES-192.
authentication-
algorithm
Specifies the authentication algorithm to use for encryption. Valid values are MD5
or SHA1.
Open Shortest Path First (OSPFv2 and OSPFv3) 1133