Configuring IPsec Authentication for RIPng

By default, IP security (IPsec) authentication is not configured. Configuring authentication is recommended to ensure system security.

Applicable Environment

As networks develop rapidly, network security has become a major concern. If IPsec authentication is configured on a RIPng network, the sent and received RIPng packets will be authenticated, and those cannot pass authentication will be discarded. This can improve the security of the RIPng network.

There are two methods of configuring IPsec authentication for RIPng:
  • One method is to configure IPsec authentication in RIPng processes. If IPsec authentication is enabled in a RIPng process, this configuration takes effect on all interfaces in this RIPng process. This method is recommended if IPsec authentication needs to be applied to all interfaces in a RIPng process.

  • The other method is to configure IPsec authentication on RIPng interfaces. This method is recommended if IPsec authentication needs to be applied only to some interfaces in a RIPng process.

Pre-configuration Tasks

Before configuring IPsec authentication for RIPng, complete the following tasks:

Copyright © Huawei Technologies Co., Ltd.
Copyright © Huawei Technologies Co., Ltd.
< Previous topic Next topic >