Reference Guide

Table Of Contents
be 32 plain hex digits. For SHA-1 authentication, the non-encrypted key must be 40 hex digits. An encrypted key is not
supported.
To delete an IPsec encryption policy, use the no area area-id encryption ipsec spi number command.
Configure IPsec encryption for OSPFv3 area
OS10(config-router-ospfv3-100)# area 1 encryption ipsec spi 401 esp des 1234567812345678
md5
12345678123456781234567812345678
OS10(config-router-ospfv3-100)# show configuration
!
router ospfv3 100
area 0.0.0.1 encryption ipsec spi 401 esp des 1234567812345678 md5
12345678123456781234567812345678
Troubleshoot OSPFv3
You can troubleshoot OSPFv3 operations, as well as check questions for any typical issues that interrupt a process.
Is OSPFv3 enabled globally?
Is OSPFv3 enabled on the interface?
Are adjacencies established correctly?
Are the interfaces configured for L3 correctly?
Is the router in the correct area type?
Are the OSPF routes included in the OSPF database?
Are the OSPF routes included in the routing table in addition to the OSPF database?
Are you able to ping the link-local IPv6 address of adjacent router interface?
Troubleshooting OSPFv3 with show Commands
View a summary of all OSPF process IDs enabled in EXEC mode.
show running-configuration ospfv3
View summary information of IP routes in EXEC mode.
show ipv6 route summary
View summary information for the OSPF database in EXEC mode.
show ipv6 ospf database
View the configuration of OSPF neighbors connected to the local router in EXEC mode.
show ipv6 ospf neighbor
View OSPF Configuration
OS10# show running-configuration ospfv3
!
interface ethernet1/1/1
ip ospf 100 area 0.0.0.0
!
router ospf 100
log-adjacency-changes
OSPFv3 Commands
area authentication
Configures authentication for an OSPFv3 area.
Syntax
area area-id authentication ipsec spi number {MD5 | SHA1} key
422 Layer 3