Users Guide

Table Of Contents
Usage
Information
Before you enable IPsec authentication on an OSPFv3 interface, you must enable IPv6 unicast routing
globally, configure an IPv6 address and enable OSPFv3 on the interface, and assign it to an area.
When you configure encryption on an interface, both IPsec encryption and authentication are enabled.
You cannot configure encryption if you have already configured an interface for IPsec authentication
using the ipv6 ospf authentication ipsec command. To configure encryption, you must first
delete the authentication policy.
All neighboring OSPFv3 routers must share the same encryption key to decrypt information. Only a
non-encrypted key is supported. Required lengths of the non-encrypted key are: 3DES 48 hex
digits; DES 16 hex digits; AES-CBC 32 hex digits for AES-128 and 48 hex digits for AES-192.
All neighboring OSPFv3 routers must share the same authentication key to exchange information. Only
a non-encrypted key is supported. For MD5 authentication, the non-encrypted key must be 32 plain
hex digits. For SHA1 authentication, the non-encrypted key must be 40 hex digits. An encrypted key is
not supported.
Example
OS10(config)# interface ethernet 1/1/6
OS10(conf-if-eth1/1/6)# ipv6 ospf encryption ipsec spi 500 esp des
1234567812345678 md5 12345678123456781234567812345678
OS10(config)# interface ethernet 1/1/5
OS10(conf-if-eth1/1/5)# ipv6 ospf encryption null
Supported
Releases
10.4.0E(R1) or later
ipv6 ospf hello-interval
Sets the time interval between hello packets sent on an interface.
Syntax
ipv6 ospf hello-interval seconds
Parameters seconds Enter the hello-interval value in seconds, from 1 to 65535.
Default 10 seconds
Command Mode INTERFACE
Usage
Information
All routers in a network must have the same hello time interval between the hello packets. The no version
of the this command resets the value to the default.
Example
OS10(config)# interface vlan 10
OS10(conf-if-vl-10)# ipv6 ospf hello-interval 30
Supported
Releases
10.3.0E or later
ipv6 ospf mtu-ignore
Disables MTU size detection on received Database Descriptor (DBD) packets when forming OSPFv3 adjacency.
Syntax
ipv6 ospf mtu-ignore
Parameters None
Default Not configured
Command Mode INTERFACE
Usage
Information
If the MTU size of the peer interface is greater than the local interface, switches that run OSPFv3 do not
form adjacencies with neighbors. Use this command to override this behavior and form adjacency.
If you try to disable a neighborship using the no ipv6 ospf mtu-ignore command after a
neighborship is formed using the ipv6 ospf mtu-ignore command, the neighborship still continues.
Layer 3 787