Administrator Guide

For SHA-1 authentication, the key must be 40 hex digits (non-encrypted) or 80 hex digits
(encrypted).
null
Causes an encryption policy congured for the area to not be inherited on the interface.
Defaults Not congured.
Command Modes ROUTER OSPFv3
Command History
This guide is platform-specic. For command information about other platforms, see the relevant Dell Networking
OS Command Line Reference Guide.
Version Description
9.8(1.0) Introduced on the Z9100-ON.
9.8(0.0P5) Introduced on the S4048-ON.
9.8(0.0P2) Introduced on the S3048-ON.
9.2(1.0) Introduced on the Z9500.
9.1.(0.0) Introduced on the S4810 and Z9000.
8.4.2.0 Introduced on the E-Series.
8.3.19.0 Introduced on the S4820T.
Usage Information
Before you enable IPsec encryption on an OSPFv3 interface, rst enable OSPFv3 globally on the router. Congure
the same encryption policy (same SPI and keys) on each interface in an OSPFv3 link.
An SPI value must be unique to one IPsec security policy (authentication or encryption) on the router.
When you congure encryption for an OSPFv3 area with the area encryption command, you enable both
IPsec encryption and authentication. However, when you enable authentication on an area with the area
authentication command, you do not enable encryption at the same time.
If you have enabled IPsec authentication in an OSPFv3 area with the area authentication command, you
cannot use the
area encryption command in the area at the same time.
The conguration of IPsec encryption on an interface-level takes precedence over an area-level conguration. If
you remove an interface conguration, an area encryption policy that has been congured is applied to the
interface.
To remove an IPsec encryption policy from an interface, enter the no area area-id encryption spi number command.
Related Commands
ipv6 ospf encryptioncongure an IPsec encryption policy on an OSPFv3 interface.
show crypto ipsec policy – display the conguration of IPsec encryption policies.
1142 Open Shortest Path First (OSPFv2 and OSPFv3)