Area-Message-Digest-Key - Juniper JUNOSE SOFTWARE 11.2.X - XML MANAGEMENT PROTOCOL GUIDE 6-30-2010 Command Reference Manual

Software for e series broadband services routers command reference a to m
Hide thumbs Also See for JUNOSE SOFTWARE 11.2.X - XML MANAGEMENT PROTOCOL GUIDE 6-30-2010:
Table of Contents

Advertisement

area-message-digest-key

Syntax
Release Information
Description
Options
Copyright © 2010, Juniper Networks, Inc.
area-message-digest-key keyId hmac-md5 [ 0 | 8 ] key
[ start-accept startAcceptTime [ { startAcceptMonth startAcceptDay | startAcceptDay
startAcceptMonth } startAcceptYear ] ]
[ start-generate startGenTime [ { startGenMonth startGenDay | startGenDay startGenMonth
} startGenYear ] ]
[ stop-accept { never | stopAcceptTime [ { stopAcceptMonth stopAcceptDay |
stopAcceptDay stopAcceptMonth } stopAcceptYear ] } ]
[ stop-generate { never | stopGenTime [ { stopGenMonth stopGenDay | stopGenDay
stopGenMonth } stopGenYear ] } ]
no area-message-digest-key keyId
Command introduced before JunosE Release 7.1.0.
Specifies an HMAC MD5 key that the router uses to create a secure, encrypted message
digest of each IS-IS level 1 packet (LSPs, CSNPs, and PSNPs). The digest is inserted into
the packet from which it is created. Using this algorithm for area routers protects against
unauthorized routers injecting false routing information into your network.
You can specify when the router will start (default is the current time) and stop (default
is never) accepting packets that include a digest made with this key. You can specify
when the router will start (default is the current time plus 2 minutes) and stop (default
is never) generating packets that include a digest made with this key. The no version
deletes the key specified by the keyId.
NOTE: Issuing this command enables MD5 authentication of level 1 LSPs only. To enable
authentication of level 1 CSNPs or PSNPs, use the area-authentication command.
keyId—Integer from 1 to 255 that is a unique identifier for the secret key, sent with the
message digest in the packet.
0—Indicates the key is entered in unencrypted form (plaintext); default option
8—Indicates the key is entered in encrypted form (ciphertext)
key—String of up to 20 alphanumeric characters; secret key used by the HMAC MD5
algorithm to generate the message digest
startAcceptTime, startAcceptMonth, startAcceptDay, startAcceptYear—Time, month,
day, year that the router will start accepting packets created with this password. Use
military time format HH : MM[: SS ].
startGenTime, startGenMonth, startGenDay, startGenYear—Time, month, day, year that
the router will start inserting this password into packets. Use military time format HH
: MM[: SS ].
Chapter 2: A Commands
127

Advertisement

Table of Contents
loading

This manual is also suitable for:

Junose 11.2

Table of Contents