Connectivity Guide

Table Of Contents
You cannot use an IPsec MD5 or SHA-1 authentication type and the null setting at same time on an interface. These settings are mutually
exclusive.
Enable IPsec authentication for OSPFv3 packets in Interface mode.
ipv6 ospf authentication {null | ipsec spi number {MD5 | SHA1} key}
null — Prevent an authentication policy congured for the area to be inherited on the interface. Only use this parameter if you
congure IPsec area authentication.
ipsec spi number — Enter a unique security policy index (SPI) value, from 256 to 4294967295.
md5 — Enable message digest 5 (MD5) authentication.
sha1 — Enable secure hash algorithm 1 (SHA-1) authentication.
key — Enter the text string used in the authentication type. All neighboring OSPFv3 routers must share the key to exchange
information. Only a non-encrypted key is supported. For MD5 authentication, the non-encrypted key must be 32 plain hex digits.
For SHA-1 authentication, the non-encrypted key must be 40 hex digits. An encrypted key is not supported.
To delete an IPsec authentication policy, use the no ipv6 ospf authentication ipsec spi number or no ipv6 ospf
authentication null command.
Congure IPsec authentication on interface
OS10(conf-if-eth1/1/1)# ipv6 ospf authentication ipsec spi 400 md5
12345678123456781234567812345678
OS10(conf-if-eth1/1/1)# show configuration
!
interface ethernet1/1/1
ipv6 ospf authentication ipsec spi 400 md5 12345678123456781234567812345678
no switchport
no shutdown
ipv6 address 1::1/64
IPsec encryption on interfaces
Prerequisite: Before you enable IPsec encryption on an OSPFv3 interface, enable IPv6 unicast routing globally, enable OSPFv3 on the
interface, and assign it to an area.
When you congure encryption on an interface, both IPsec encryption and authentication are enabled. You cannot congure encryption if
you have already congured an interface for IPsec authentication using the ipv6 ospf authentication ipsec command. To
congure encryption, you must rst delete the authentication policy.
Enable IPsec encryption for OSPFv3 packets in Interface mode.
ipv6 ospf encryption ipsec spi number esp encryption-type
key authentication-type key
ipsec spi number — Enter a unique security policy index (SPI) value, from 256 to 4294967295.
esp encryption-type key — Enter the encryption algorithm used with ESP (3DES, DES, AES-CBC, or NULL). For AES-
CBC, only the AES-128 and AES-192 ciphers are supported.
key — Enter the text string used in the encryption algorithm. All neighboring OSPFv3 routers must share the key to decrypt
information. Only a non-encrypted key is supported. Required lengths of the non-encrypted key are: 3DES — 48 hex digits; DES —
16 hex digits; AES-CBC — 32 hex digits for AES-128 and 48 hex digits for AES-192.
authentication-type key — Enter the encryption authentication MD5 or SHA1 algorithm to use.
key — Enter the text string used in the authentication algorithm. All neighboring OSPFv3 routers must share the key to exchange
information. Only a non-encrypted key is supported. For MD5 authentication, the non-encrypted key must be 32 plain hex digits.
For SHA1 authentication, the non-encrypted key must be 40 hex digits. An encrypted key is not supported.
To delete an IPsec encryption policy, use the no ipv6 ospf encryption ipsec spi number or no ipv6 ospf encryption
null command.
Congure IPsec encryption on interface
OS10(conf-if-eth1/1/1)# ipv6 ospf encryption ipsec spi 500 esp des 1234567812345678 md5
12345678123456781234567812345678
Layer 3
473