Connectivity Guide

Table Of Contents
OS10(conf-if-eth1/1/1)# show configuration
!
interface ethernet1/1/1
ipv6 ospf encryption ipsec spi 500 esp des 1234567812345678 md5 12345678123456781234567812345678
no switchport
no shutdown
ipv6 address 1::1/64
Congure IPsec authentication for OSPFv3 area
Prerequisite: Before you enable IPsec authentication for an OSPFv3 area, enable OSPFv3 globally on the router.
Enable IPsec authentication for OSPFv3 packets in an area in Router-OSPFv3 mode.
area area-id authentication ipsec spi number {MD5 | SHA1} key
area area-id — Enter an area ID as a number or IPv6 prex.
ipsec spi number — Enter a unique security policy index (SPI) value, from 256 to 4294967295.
md5 — Enable message digest 5 (MD5) authentication.
sha1 — Enable secure hash algorithm 1 (SHA1) authentication.
key — Enter the text string used in the authentication type. All OSPFv3 routers in the area share the key to exchange information.
Only a non-encrypted key is supported. For MD5 authentication, the non-encrypted key must be 32 plain hex digits. For SHA1
authentication, the non-encrypted key must be 40 hex digits. An encrypted key is not supported.
To delete an IPsec area authentication policy, use the no area area-id authentication ipsec spi number command.
Congure IPsec authentication for an OSPfv3 area
OS10(config-router-ospfv3-100)# area 1 authentication ipsec spi 400 md5
12345678123456781234567812345678
OS10(config-router-ospfv3-100)# show configuration
!
router ospfv3 100
area 0.0.0.1 authentication ipsec spi 400 md5 12345678123456781234567812345678
IPsec encryption for OSPV3 area
Prerequisite: Before you enable IPsec encryption for an OSPFv3 area, rst enable OSPFv3 globally on the router.
When you congure encryption at the area level, both IPsec encryption and authentication are enabled. You cannot congure encryption if
you have already congured an IPsec area authentication using the area ospf authentication ipsec command. To congure
encryption, you must rst delete the authentication policy.
Enable IPsec encryption for OSPFv3 packets in an area in Router-OSPFv3 mode.
area area-id encryption ipsec spi number esp encryption-type key
authentication-type key
area area-id — Enter an area ID as a number or IPv6 prex.
ipsec spi number — Enter a unique security policy index (SPI) value, from 256 to 4294967295.
esp encryption-type — Enter the encryption algorithm used with ESP (3DES, DES, AES-CBC, or NULL). For AES-CBC,
only the AES-128 and AES-192 ciphers are supported.
key — Enter the text string used in the encryption algorithm. All neighboring OSPFv3 routers must share the key to decrypt
information. Only a non-encrypted key is supported. Required lengths of the non-encrypted key are: 3DES — 48 hex digits; DES —
16 hex digits; AES-CBC — 32 hex digits for AES-128 and 48 hex digits for AES-192.
authentication-type — Enter the encryption authentication MD5 or SHA1 algorithm to use.
key — Enter the text string used in the authentication algorithm. All neighboring OSPFv3 routers must share the key to exchange
information. Only a non-encrypted key is supported. For MD5 authentication, the non-encrypted key must be 32 plain hex digits.
For SHA1 authentication, the non-encrypted key must be 40 hex digits. An encrypted key is not supported.
To delete an IPsec encryption policy, use the no area area-id encryption ipsec spi number command.
474
Layer 3