RSVP authentication is configured to protect a node from attacks and improve network security.
An unauthorized node attempts to establish an RSVP neighbor relationship with a local node.
A remote node constructs forged RSVP messages to establish an RSVP neighbor relationship with a local node and then initiates attacks to the local node.
RSVP key authentication cannot prevent replay attacks or RSVP message mis-sequence during network congestion. RSVP message mis-sequence causes authentication termination between RSVP neighbors. The handshake function, message window functions, and RSVP key authentication are used to prevent the preceding problems.
CR-LSP flapping may lead to frequent re-establishment of RSVP neighbor relationships. As a result, the handshake function is repeatedly performed and RSVP authentication is prolonged. An RSVP authentication lifetime is set to resolve the preceding problems. If no CR-LSP exists, RSVP neighbors still retain their neighbor relationship until the RSVP authentication lifetime expires.