Alcatel-Lucent 7750 SR Manual page 1392

Os services guide
Hide thumbs Also See for 7750 SR:
Table of Contents

Advertisement

VPRN Service Configuration Commands
All neighboring routers must use the same type of authentication and password for proper protocol
communication. If the authentication-type is configured as password, then this key must be
configured.
By default, no authentication key is configured.
The no form of the command removes the authentication key.
Default
no authentication-key — No authentication key is defined.
Parameters
authentication-key — The authentication key. The key can be any combination of ASCII characters
hash-key — The hash key. The key can be any combination of ASCII characters up to 22 characters in
hash — Specifies the key is entered in an encrypted form. If the hash parameter is not used, the key
hash2 — Specifies the key is entered in a more complex encrypted form. If the hash2 parameter is
authentication-type
Syntax
authentication-type {password | message-digest}
no authentication-type
Context
config>service>vprn>ospf>area>interface
config>service>vprn>ospf>area>virtual-link
Description
This command enables authentication and specifies the type of authentication to be used on the OSPF
interface, virtual-link, and sham-link.
Note that this command is not valid in the OSPF3 context.
Both simple password and message-digest authentication are supported.
By default, authentication is not enabled on an interface.
The no form of the command disables authentication on the interface.
Default
no authentication — No authentication is enabled on an interface.
Parameters
password — This keyword enables simple password (plain text) authentication. If authentication is
message-digest — This keyword enables message digest MD5 authentication in accordance with
Page 1392
up to 8 characters in length (unencrypted). If spaces are used in the string, enclose the entire
string in quotation marks (" ").
length (encrypted). If spaces are used in the string, enclose the entire string in quotation marks ("
").
This is useful when a user must configure the parameter, but, for security purposes, the actual
unencrypted key value is not provided.
is assumed to be in a non-encrypted, clear text form. For security, all keys are stored in encrypted
form in the configuration file with the hash parameter specified.
not used, the less encrypted hash form is assumed.
enabled and no authentication type is specified in the command, simple password authentication
is enabled.
RFC1321. If this option is configured, then at least one message-digest-key must be configured
7750 SR OS Services Guide

Advertisement

Table of Contents
loading

Table of Contents