Configuring Routing Domain Authentication; Configuring Is-Is Gr - HP HPE FlexNetwork 7500 series Configuration Manual

Table of Contents

Advertisement

Step
3.
Specify the area
authentication mode and
key.
4.
(Optional.) Configure the
interface not to check the
authentication
information in the
received Level-1
packets, including LSPs,
CSNPs, and PSNPs.

Configuring routing domain authentication

Routing domain authentication prevents untrusted routing information from entering into a routing
domain. A router with the authentication configured encapsulates the key in the specified mode into
Level-2 packets (LSP, CSNP, and PSNP) and check the key in received Level-2 packets.
All the routers in the backbone must have the same authentication mode and key.
To prevent packet exchange failure in case of an authentication key change, configure IS-IS not to
check the authentication information in the received packets.
To configure routing domain authentication:
Step
1.
Enter system view.
2.
Enter IS-IS view.
3.
Specify the routing domain
authentication mode and
key.
4.
(Optional.) Configure the
interface not to check the
authentication information in
the received Level-2
packets, including LSPs,
CSNPs, and PSNPs.

Configuring IS-IS GR

GR ensures forwarding continuity when a routing protocol restarts or an active/standby switchover
occurs.
Two routers are required to complete a GR process. The following are router roles in a GR process.
GR restarter—Graceful restarting router. It must have GR capability.
GR helper—A neighbor of the GR restarter. It assists the GR restarter to complete the GR
process. By default, the device acts as the GR helper.
Command
area-authentication-mode { { gca
key-id { hmac-sha-1 | hmac-sha-224
| hmac-sha-256 | hmac-sha-384 |
hmac-sha-512 } [ nonstandard ] |
md5 | simple } { cipher | plain } string
| keychain keychain-name } [ ip | osi ]
area-authentication send-only
Command
system-view
isis [ process-id ] [ vpn-instance
vpn-instance-name ]
domain-authentication-mode
{ { gca key-id { hmac-sha-1 |
hmac-sha-224 | hmac-sha-256 |
hmac-sha-384 | hmac-sha-512 }
[ nonstandard ] | md5 | simple }
{ cipher | plain } string | keychain
keychain-name } [ ip | osi ]
domain-authentication
send-only
163
Remarks
By default, no area authentication
is configured.
When the authentication mode
and key are configured, the
interface checks the
authentication information in the
received packets by default.
Remarks
N/A
N/A
By default, no routing domain
authentication is configured.
When the authentication mode
and key are configured, the
interface checks the
authentication information in the
received packets by default.

Advertisement

Table of Contents
loading

Table of Contents