Users Guide

Table Of Contents
6. Change the default setting to ignore the MTU mismatch with the peer, when the MTU size of the peer interface is higher
than the local MTU size.
ipv6 ospf mtu-ignore
Change the OSPFv3 interface parameters
OS10(config)# interface ethernet 1/1/1
OS10(conf-if-eth1/1/1)# ipv6 ospf hello-interval 5
OS10(conf-if-eth1/1/1)# ipv6 ospf dead-interval 20
OS10(conf-if-eth1/1/1)# ipv6 ospf priority 4
OS10(conf-if-eth1/1/1)# ipv6 ospf mtu-ignore
View the OSPFv3 interface parameters
OS10# show ipv6 ospf interface
ethernet1/1/1 is up, line protocol is up
Link Local Address fe80::20c:29ff:fe0a:d59/64, Interface ID 5
Area 0.0.0.0, Process ID 200, Instance ID 0, Router ID 10.0.0.2
Network Type broadcast, Cost: 1
Transmit Delay is 1 sec, State BDR, Priority 1
Designated Router on this network is 2.2.2.2
Backup Designated router on this network is 10.0.0.2 (local)
Timer intervals configured, Hello 10, Dead 40, Wait 40, Retransmit 5
Neighbor Count is 1, Adjacent neighbor count is 1
Adjacent with neighbor 2.2.2.2(Designated Router)
OS10# do show running-configuration ospfv3
!
interface ethernet1/1/9
ipv6 ospf 1 area 0.0.0.0
ipv6 ospf dead-interval 20
ipv6 ospf hello-interval 5
ipv6 ospf mtu-ignore
Default route
You can generate an external default route and distribute the default information to the OSPFv3 routing domain.
Generate the default route, using the default-information originate [always] command in ROUTER-OSPFv3
mode.
Configure default route
OS10(config)# router ospfv3 100
OS10(config-router-ospf-100)# default-information originate always
View default route configuration
OS10(config-router-ospf-100)# show configuration
!
router ospfv3 100
default-information originate always
OSPFv3 IPsec authentication and encryption
Unlike OSPFv2, OSPFv3 does not have authentication fields in its protocol header to provide security. To provide authentication
and confidentiality, OSPFv3 uses IP Security (IPsec) a collection of security protocols for authenticating and encrypting data
packets. OS10 OSPFv3 supports IPsec using the IPv6 authentication header (AH) or IPv6 encapsulating security payload (ESP).
AH authentication verifies that data is not altered during transmission and ensures that users are communicating with the
intended individual or organization. The authentication header is inserted after the IP header with a value of 51. MD5 and
SHA1 authentication types are supported; encrypted and unencrypted keys are supported.
ESP encryption encapsulates data, enabling data protection that follows in the datagram. The ESP extension header is
inserted after the IP header and before the next layer protocol header. 3DES, DES, AES-CBC, and NULL encryption
algorithms are supported; encrypted and unencrypted keys are supported.
774
Layer 3