Alcatel-Lucent 7210 SAS M Service Manual page 657

Hide thumbs Also See for 7210 SAS M:
Table of Contents

Advertisement

as-override
Syntax
[no] as-override
Context
config>service>vprn>bgp>group
config>service>vprn>bgp>group>neighbor
This command replaces all instances of the peer's AS number with the local AS number in a BGP
Description
route's AS_PATH.
This command breaks BGP's loop detection mechanism. It should be used carefully.
as-override is not enabled by default.
Default
authentication-key
Syntax
authentication-key [authentication-key | hash-key] [hash | hash2]
no authentication-key
Context
config>service>vprn>bgp
config>service>vprn>bgp>group
config>service>vprn>bgp>group>neighbor
This command configures the BGP authentication key.
Description
Authentication is performed between neighboring routers before setting up the BGP session by veri-
fying the password. Authentication is performed using the MD-5 message-based digest. The
authentication key can be any combination of letters or numbers from 1 to 16.
The no form of the command removes the authentication password from the configuration and
effectively disables authentication.
Authentication is disabled and the authentication password is empty.
Default
authentication-key — The authentication key. The key can be any combination of ASCII characters
Parameters
hash-key — The hash key. The key can be any combination of ASCII characters up to 342 characters
hash — Specifies the key is entered in an encrypted form. If the hash parameter is not used, the key
hash2 — Specifies the key is entered in a more complex encrypted form. If the hash2 parameter is
7210 SAS M Services Guide
up to 255 characters in length (unencrypted). If spaces are used in the string, enclose the entire
string in quotation marks (" ").
in length (encrypted). If spaces are used in the string, enclose the entire string in quotation marks
(" ").
This is useful when a user must configure the parameter, but, for security purposes, the actual
unencrypted key value is not provided.
is assumed to be in a non-encrypted, clear text form. For security, all keys are stored in encrypted
form in the configuration file with the hash parameter specified.
not used, the less encrypted hash form is assumed.
Virtual Private Routed Network Services
Page 657

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents