OS10 Enterprise Edition User Guide Release 10.4.0E(R3)

PDF

IPsec encryption for OSPV3 area

Prerequisite: Before you enable IPsec encryption for an OSPFv3 area, first enable OSPFv3 globally on the router.

When you configure encryption at the area level, both IPsec encryption and authentication are enabled. You cannot configure encryption if you have already configured an IPsec area authentication ( area ospf authentication ipsec). To configure encryption, you must first delete the authentication policy.

  • Enable IPsec encryption for OSPFv3 packets in an area in Router-OSPFv3 mode.
    area 
                                        area-id  encryption ipsec spi 
                                        number esp 
                                        encryption-type key 
                                        
                                        authentication-type
                                        key
                                     
    • area area-id — Enter an area ID as a number or IPv6 prefix.
    • ipsec spi number — Enter a unique security policy index (SPI) value (256 to 4294967295).
    • esp encryption-type — Enter the encryption algorithm used with ESP (3DES, DES, AES-CBC, or NULL). For AES-CBC, only the AES-128 and AES-192 ciphers are supported.
    • key — Enter the text string used in the encryption algorithm. All neighboring OSPFv3 routers must share the key to decrypt information. Only a non-encrypted key is supported. Required lengths of the non-encrypted key are: 3DES — 48 hex digits; DES — 16 hex digits; AES-CBC — 32 hex digits for AES-128 and 48 hex digits for AES-192.
    • authentication-type — Enter the encryption authentication algorithm to use (MD5 or SHA1).
    • key — Enter the text string used in the authentication algorithm. All neighboring OSPFv3 routers must share the key to exchange information. Only a non-encrypted key is supported. For MD5 authentication, the non-encrypted key must be 32 plain hex digits. For SHA-1 authentication, the non-encrypted key must be 40 hex digits. An encrypted key is not supported.

To delete an IPsec encryption policy, use the no area area-id encryption ipsec spi number command.

Configure IPsec encryption for OSPFv3 area
OS10(config-router-ospfv3-100)# area 1 encryption ipsec spi 401 esp des 1234567812345678 md5
                                 12345678123456781234567812345678
                                 OS10(config-router-ospfv3-100)# show configuration
                                 !
                                 router ospfv3 100
                                 area 0.0.0.1 encryption ipsec spi 401 esp des 1234567812345678 md5 12345678123456781234567812345678
                              

Rate this content

Accurate
Useful
Easy to understand
Was this article helpful?
0/3000 characters
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please select whether the article was helpful or not.
  Comments cannot contain these special characters: <>()\