This section describes how to configure BGP TCP Authentication Option (TCP-AO) authentication to check the integrity of packets and prevent TCP replay attacks.
The TCP-AO is used to authenticate received and to-be sent packets during TCP session establishment and data exchange. It supports packet integrity check to prevent TCP replay attacks. After creating a TCP-AO, run the peer tcp-ao policy command in the BGP view and specify the peer that needs to reference the TCP-AO and the TCP-AO name. This enables the BGP session to be encrypted. Such configuration is applicable to networks that require high security. Different peers can reference the same TCP-AO.
The system view is displayed.
A TCP-AO is created, and its view is displayed.
The TCP-AO is bound to a keychain.
Before performing this step, complete configuring basic keychain functions in Pre-configuration Tasks to create a keychain.
A key ID is created for the TCP-AO, and the TCP-AO key ID view is displayed.
send-id and receive-id are configured for the Key ID.
The upper-level view is displayed.
The system view is displayed.
The BGP view is displayed.
The IP address of a peer and the number of the AS where the peer resides are specified.
TCP-AO authentication is configured for the TCP connection to be set up between BGP peers.
The value of the tcp-ao-name parameter must be set to the TCP-AO created in step 2.
For the same peer, the authentication modes TCP-AO, MD5, and keychain are mutually exclusive.
The configuration is committed.