Alcatel-Lucent 7750 SR OS Service Manual page 1065

Service router - mobile gateway
Hide thumbs Also See for 7750 SR OS:
Table of Contents

Advertisement

Description
This command replaces all instances of the peer's AS number with the local AS number in a BGP
route's AS_PATH.
This command breaks BGP's loop detection mechanism. It should be used carefully.
Default
as-override is not enabled by default.
authentication-key
Syntax
authentication-key [authentication-key | hash-key] [hash | hash2]
no authentication-key
Context
config>service>vprn>bgp
config>service>vprn>bgp>group
config>service>vprn>bgp>group>neighbor
Description
This command configures the BGP authentication key.
Authentication is performed between neighboring routers before setting up the BGP session by veri-
fying the password. Authentication is performed using the MD-5 message-based digest. The
authentication key can be any combination of letters or numbers from 1 to 16.
The no form of the command removes the authentication password from the configuration and
effectively disables authentication.
Default
Authentication is disabled and the authentication password is empty.
Parameters
authentication-key — The authentication key. The key can be any combination of ASCII characters
hash-key — The hash key. The key can be any combination of ASCII characters up to 342 characters
hash — Specifies the key is entered in an encrypted form. If the hash parameter is not used, the key
hash2 — Specifies the key is entered in a more complex encrypted form. If the hash2 parameter is
auth-keychain
Syntax
auth-keychain name
Context
config>service>vprn>bgp
config>service>vprn>bgp>group
config>service>vprn>bgp>group>neighbor
Description
This command configures the BGP authentication key for all peers.
The keychain allows the rollover of authentication keys during the lifetime of a session.
7750 SR OS Services Guide
up to 255 characters in length (unencrypted). If spaces are used in the string, enclose the entire
string in quotation marks (" ").
in length (encrypted). If spaces are used in the string, enclose the entire string in quotation marks
(" ").
This is useful when a user must configure the parameter, but, for security purposes, the actual
unencrypted key value is not provided.
is assumed to be in a non-encrypted, clear text form. For security, all keys are stored in encrypted
form in the configuration file with the hash parameter specified.
not used, the less encrypted hash form is assumed.
Virtual Private Routed Network Services
Page 1065

Advertisement

Table of Contents
loading

Table of Contents