Reference Guide
Change OSPFv3 Interface Parameters
OS10(config)# interface ethernet 1/1/1
OS10(conf-if-eth1/1/1)# ipv6 ospf hello-interval 5
OS10(conf-if-eth1/1/1)# ipv6 ospf dead-interval 20
OS10(conf-if-eth1/1/1)# ipv6 ospf priority 4
View OSPFv3 Interface Parameters
OS10# show ipv6 ospf interface
ethernet1/1/1 is up, line protocol is up
 Link Local Address fe80::20c:29ff:fe0a:d59/64, Interface ID 5
 Area 0.0.0.0, Process ID 200, Instance ID 0, Router ID 10.0.0.2
 Network Type broadcast, Cost: 1
 Transmit Delay is 1 sec, State BDR, Priority 1
 Designated Router on this network is 2.2.2.2
 Backup Designated router on this network is 10.0.0.2 (local)
 Timer intervals configured, Hello 10, Dead 40, Wait 40, Retransmit 5
 Neighbor Count is 1, Adjacent neighbor count is 1
 Adjacent with neighbor 2.2.2.2(Designated Router)
Default route
You can generate an external default route and distribute the default information to the OSPFv3 routing domain.
• To generate the default route, use the default-information originate [always] command in ROUTER-OSPFv3 mode.
Congure default route
OS10(config)# router ospfv3 100
OS10(config-router-ospf-100)# default-information originate always 
View default route conguration
OS10(config-router-ospf-100)# show configuration
!
router ospfv3 100
 default-information originate always 
OSPFv3 IPsec authentication and encryption
Unlike OSPFv2, OSPFv3 does not have authentication elds in its protocol header to provide security. To provide authentication and 
condentiality, OSPFv3 uses IP Security (IPsec) — a collection of security protocols for authenticating and encrypting data packets. OS10 
OSPFv3 supports IPsec using the IPv6 authentication header (AH) or IPv6 encapsulating security payload (ESP).
• AH authentication veries that data is not altered during transmission and ensures that users are communicating with the intended 
individual or organization. The authentication header is inserted after the IP header with a value of 51. MD5 and SHA1 authentication 
types are supported; encrypted and unencrypted keys are supported.
• ESP encryption encapsulates data, enabling the protection of data that follows in the datagram. The ESP extension header is inserted 
after the IP header and before the next layer protocol header. 3DES, DES, AES-CBC, and NULL encryption algorithms are supported; 
encrypted and unencrypted keys are supported.
Apply IPsec authentication or encryption on a physical, port-channel, or VLAN interface or in an OSPFv3 area. Each conguration consists 
of a security policy index (SPI) and the key used to validate OSPFv3 packets. After you congure an IPsec protocol for OSPFv3, IPsec 
operation is invisible to the user.
You can only enable one security protocol (authentication or encryption) at a time on an interface or for an area. Enable IPsec AH with the 
ipv6 ospf authentication command; enable IPsec ESP with the ipv6 ospf encryption command.
• A security policy congured for an area is inherited by default on all interfaces in the area.
• A security policy congured on an interface overrides any area-level congured security for the area to which the interface is assigned.
Layer 3
381










