[Contents] [Prev] [Next] [Index] [Report an Error]

Enabling Authentication for OSPF Exchanges

All OSPFv2 protocol exchanges can be authenticated to guarantee that only trusted routers participate in the AS's routing. By default, OSPF authentication is disabled.

OSPFv3 does not support authentication.

You can enable either of two authentication types:

Because OSPF performs authentication at the area level, all routers within the area must have the same authentication and corresponding password (key) configured. For MD5 authentication to work, both the receiving and transmitting routers must have the same MD5 key.

To enable OSPF authentication on the stub area:

  1. Navigate to the top of the configuration hierarchy in either the J-Web or the CLI configuration editor.
  2. Perform the configuration tasks described in Table 52.

Table 52: Enabling OSPF Authentication

Task

J-Web Configuration Editor

CLI Configuration Editor

Navigate to the 0.0.0.0 level in the configuration hierarchy.

In the configuration editor hierarchy, select Protocols>Ospf>Area id 0.0.0.0.

From the top of the configuration hierarchy, enter

edit protocols ospf area 0.0.0.0

Set the authentication type.

  1. From the Authentication type list, select the type of authentication to enable on the stub area:

    simple

    md5

  2. Click OK.

Set the authentication type to either simple or md5. For example:

set authentication--type md5

Changes in the CLI are applied automatically when you execute the set command.

Navigate to the interface-name level in the configuration hierarchy.

In the configuration editor hierarchy under Protocols>Ospf>Area>0.0.0.0> interface, click an interface name.

From the top of the configuration hierarchy, enter

edit protocols ospf area 0.0.0.0 interface interface-name

Set the authentication password (key) and, if applicable, the key identifier.

  1. In the Key name box, type a password:

    For simple authentication, type from 1 through 8 ASCII characters.

    For MD5 authentication, type from 1 through 16 ASCII characters.

  2. For MD5 authentication only, in the Key ID box, type any value between 0 (the default) and 255 to associate with the MD5 password.
  3. Click OK.
  4. Repeat Step 1 through Step 3 for each interface in the stub area for which you are enabling authentication.
  1. Set the authentication password:

    For simple authentication, type from 1 through 8 ASCII characters.

    For MD5 authentication, type from 1 through 16 ASCII characters.

  2. For MD5 authentication only, set the key identifier to associate with the MD5 password to any value between 0 (the default) and 255.

    For example:

    set authentication-key Chey3nne key-id 2

    Changes in the CLI are applied automatically when you execute the command.

  3. Repeat Step 1 and Step 2 for each interface in the stub area for which you are enabling authentication.

[Contents] [Prev] [Next] [Index] [Report an Error]