Table 7: Security Algorithm Support Per Protocol - Alcatel-Lucent 7450 System Management Manual

Ethernet service switch
Hide thumbs Also See for 7450:
Table of Contents

Advertisement

Table 6: Keychain Mapping (Continued)
Definition
A vector that determines whether the
key[i] is to be used to generate MACs for
inbound segments, outbound segments,
or both.
Start time from which key[i] can be used.
End time after which key[i] cannot be
used by sending TCPs.
Start time from which key[i] can be used.
End time after which key[i] cannot be
used
The following table details which authentication algorithm can be used in association with
specific routing protocols.
Table 6

Table 7: Security Algorithm Support Per Protocol

Protocol
Clear Text
OSPF
Yes
IS-IS
Yes
RSVP
Yes
BGP
No
LDP
No
7450 ESS System Mangement Guide
config>system>security>keychain>direction
config>system>security>keychain>direction>bi>entry>begin-time
config>system>security>keychain>direction>uni>send>entry >begin-time
Inferred by the begin-time of the next key (youngest key rule).
config>system>security>keychain>direction>bi>entry>begin-time
config>system>security>keychain>direction>bi>entry>tolerance
config>system>security>keychain>direction>uni>receive>entry >begin-
time
config>system>security>keychain>direction>uni>receive>entry >tolerance
config>system>security>keychain>direction>uni>receive>entry>end-time
shows the mapping between these attributes and the CLI command to set them.
MD5
HMAC-
MD5
Yes
No
No
Yes
No
Yes
Yes
No
Yes
No
CLI
HMAC-
HMAC-
SHA-1-96
SHA-1
Yes
Yes
No
Yes
No
Yes
Yes
No
Yes
No
Security
HMAC-
AES-128-
SHA-256
CMAC-96
Yes
No
Yes
No
No
No
No
Yes
No
Yes
Page 63

Advertisement

Table of Contents
loading

Table of Contents