area-authentication-mode (IS-IS view)

Function

The area-authentication-mode command enables an IS-IS device to authenticate received Level-1 packets (LSPs and SNPs) based on the pre-defined authentication mode and password and to add authentication information to the Level-1 packets to be sent.

The undo area-authentication-mode command disables the function.

It is recommended that you enable authentication and use the HMAC-SHA256 algorithm to improve security, preventing route information from being modified by unauthorized users.

By default, the system neither encapsulates the generated Level-1 routing packets with authentication information nor authenticates received Level-1 routing packets. Configuring area authentication is recommended to ensure system security.

Format

area-authentication-mode { simple { plain simple-plain | [ cipher ] simple-cipher } | md5 { plain plain | [ cipher ] cipher } } [ ip | osi ] [ [ snp-packet { send-only | authentication-avoid } ] | all-send-only ]

area-authentication-mode keychain keychain-name [ [ snp-packet { send-only | authentication-avoid } ] | all-send-only ]

area-authentication-mode hmac-sha256 key-id key-id { plain plain | [ cipher ] cipher } [ [ snp-packet { send-only | authentication-avoid } ] | all-send-only ]

undo area-authentication-mode

Parameters

Parameter Description Value
simple

Indicates the simple authentication.

For security purposes, you are advised to configure a password in ciphertext mode. To further improve device security, periodically change the password.

-

plain

Indicates the simple text mode. Only the simple text can be entered. The password in the configuration file is displayed as a simple text. Simple authentication used the simple text mode by default.

When configuring an authentication password, select the ciphertext mode because the password is saved in the configuration file as a simple text if you select the simple text mode, which has a high risk. To ensure device security, change the password periodically.

-

plain

Specifies a cleartext password.

The value is a string of case-sensitive characters that can be letters or digits.

In simple authentication, the value is a string of 1 to 16 characters. In MD5 authentication, the value is a string of 1 to 255 characters.

A password cannot contain a question mark (?), but can contain spaces if surrounded by double quotation marks (""). In this case, the double quotation marks are part of the password.

simple-plain

Specifies a simple-text password.

The value is a string of case-sensitive characters that can be letters or digits.

In simple authentication, the value is a string of 1 to 16 characters. In md5 or hmac-sha256 authentication, the value is a string of 1 to 255 characters.

A password cannot contain a question mark (?), but can contain spaces if surrounded by double quotation marks (""). In this case, the double quotation marks are part of the password.

cipher

Indicates the ciphertext mode. The simple text or ciphertext can be entered. The password in the configuration file is displayed as a ciphertext. MD5 authentication uses the ciphertext mode by default.

-

cipher simple-cipher

Indicates the ciphertext mode. The simple text or ciphertext can be entered. The password in the configuration file is displayed as a ciphertext. MD5 authentication uses the ciphertext mode by default.

A ciphertext password is a character string that is encrypted using a special algorithm. A ciphertext is used for configuration restoration. The parameter value must be the same as the ciphertext in the configuration file.

The value is a string of case-sensitive characters that can be letters or digits

In simple authentication, the value is a string of 1 to 16 characters in a simple text, or a string of 24 to 128 characters in a ciphertext. In md5 or hmac-sha256 authentication, the value is a string of 1 to 255 characters in a simple text, or a string of 20 to 432 characters in a ciphertext.

A 24-character ciphertext password configured in an earlier version is also supported in this version.

A password cannot contain a question mark (?), but can contain spaces if surrounded by double quotation marks (""). In this case, the double quotation marks are part of the password.

cipher

Specifies a ciphertext password.

A ciphertext password is a character string that is encrypted using a special algorithm. A ciphertext is used for configuration restoration. The parameter value must be the same as the ciphertext in the configuration file.

The value is a string of case-sensitive characters that can be letters or digits. When quotation marks are used around the string, spaces are allowed in the string.

  • In simple authentication, the value is a string of 1 to 16 characters in a simple text, or a string of 24 to 128 characters in a ciphertext.
  • In md5 or hmac-sha256 authentication, the value is a string of 1 to 255 characters in a simple text, or a string of 20 to 432 characters in a ciphertext.
  • A 24-character ciphertext password configured in an earlier version is also supported in this version.
  • A password cannot contain a question mark (?), but can contain spaces if surrounded by double quotation marks (""). In this case, the double quotation marks are part of the password.
simple-cipher

Specifies a simple-text or ciphertext password.

A ciphertext password is a character string that is encrypted using a special algorithm. A ciphertext is used for configuration restoration. The parameter value must be the same as the ciphertext in the configuration file.

The value is a string of case-sensitive characters that can be letters or digits When quotation marks are used around the string, spaces are allowed in the string.

  • In simple authentication, the value is a string of 1 to 16 characters in a simple text, or a string of 24 to 128 characters in a ciphertext.
  • In md5 or hmac-sha256 authentication, the value is a string of 1 to 255 characters in a simple text, or a string of 20 to 432 characters in a ciphertext.

A 24-character ciphertext password configured in an earlier version is also supported in this version.

A password cannot contain a question mark (?), but can contain spaces if surrounded by double quotation marks (""). In this case, the double quotation marks are part of the password.

md5

Indicates that the password is transmitted after being encrypted using HMAC-MD5.

For the sake of security, using the HMAC-SHA256 algorithm rather than the MD5 algorithm is recommended.

-

ip

Indicates the IP authentication password. This parameter is not specified in most cases.

-

osi

Indicates the OSI authentication password. By default, the OSI authentication password is specified.

-

snp-packet

Enables the device to authenticate SNPs.

-

send-only

Enables the device to encapsulate the generated LSPs and SNPs with authentication information and authenticate the received LSPs instead of the SNPs.

-

authentication-avoid

Prevents the device from encapsulating the generated SNP packets with authentication information and authenticating received SNPs. After the parameter is configured, the device encapsulates only the generated LSPs with authentication information and authenticates received LSPs.

-

all-send-only

Enables the device to encapsulate authentication information to the generated LSPs and SNPs and prevents the device from checking authentication information in received LSPs or SNPs.

-

keychain keychain-name

Specifies the keychain that changes with time.

Before configuring this parameter, run the keychain command to create a keychain. Then, run the key-id, key-string, and algorithm commands to configure a key ID, a password, and an authentication algorithm for this keychain. Otherwise, the authentication will fail.

Keychain authentication supports only HMAC-MD5 and HMAC-SHA256 algorithms. Using any other algorithm may lead to an authentication failure.

If the dependent keychain is deleted, the neighbor relationship may be interrupted. Therefore, exercise caution when deleting the keychain.

The value is a string of 1 to 47 characters. When quotation marks are used around the string, spaces are allowed in the string.

A password cannot contain a question mark (?), but can contain spaces if surrounded by double quotation marks (""). In this case, the double quotation marks are part of the password.

hmac-sha256

Enables the device to encapsulate generated packets with the HMAC-SHA256 authentication and a password encrypted using the HMAC-SHA256 algorithm and authenticate received packets.

-

key-id key-id

Specifies a key ID for authentication, which must be the same as the one configured at the other end.

The value is an integer ranging from 0 to 65535.

Views

IS-IS view

Default Level

2: Configuration level

Task Name and Operations

Task Name Operations
isis write

Usage Guidelines

Usage Scenario

To ensure network security, you can enable a router to authenticate received packets based on the pre-defined authentication mode or add authentication information to the packets to be sent. Only the packets that are authenticated can be forwarded on the network.

The area-authentication-mode command is valid only on Level-1 or Level-1-2 routers, and it is for all topologies in an IS-IS process.

Configuration Impact

After the area-authentication-mode command is run on the local device, the device discards newly received Level-1 LSP and SNP packets if these packets fail to be authenticated. However, the device does not discard the Level-1 LSP packets in the local LSDB immediately if they fail to be authenticated. Instead, the device waits for the LSP packets to be aged out. To prevent packet loss before the area-authentication-mode command is run on the IS-IS neighbor, specify the send-only parameter in the command on all the IS-IS devices.

Regardless of whether packets pass area authentication, Level-1 IS-IS neighbor relationships can be established.

Precautions

Area authentication takes effect only on the end that is configured with area authentication. The other end that is not configured with area authentication can still receive LSPs with authentication passwords.

Example

# Set the area authentication password to Huawei-123 and the authentication mode to HMAC-SHA256.
<HUAWEI> system-view
[~HUAWEI] isis 1
[*HUAWEI-isis-1] area-authentication-mode hmac-sha256 key-id 2 Huawei-123
# Set the area authentication mode to Keychain named Huawei-123.
<HUAWEI> system-view
[~HUAWEI] isis 1
[*HUAWEI-isis-1] area-authentication-mode keychain Huawei-123
Copyright © Huawei Technologies Co., Ltd.
Copyright © Huawei Technologies Co., Ltd.
< Previous topic Next topic >