Configuring IS-IS Authentication
IS-IS authentication involves IS-IS authentication per interface, IS-IS area authentication and IS-IS routing domain authentication.
IS-IS Authentication per Interface
IS-IS authentication per interface refers to the interface that enables the IS-IS protocol to authenticate Level 1 and Level 2 Hello messages in a specified manner and password.
Area Authentication
Area authentication encapsulates authentication passwords in IS-IS packets within the Level-1 area, ensuring that only authenticated packets are received. Therefore, when authentication is required for the Level-1 area, IS-IS area authentication needs to be configured on all IS-IS devices within that area.
Domain Authentication
Domain authentication encapsulates authentication passwords in IS-IS packets within the Level-2 area, ensuring that only authenticated packets are received. Therefore, when authentication is required for the Level-2 area, IS-IS domain authentication needs to be configured on all IS-IS devices within that area.
Typically, the IS-IS protocol does not encapsulate authentication information in the sent IS-IS packets, nor does it perform authentication checks on received packets. However, in the event of malicious packet attacks that could lead to the theft of network information, configuring IS-IS authentication can enhance network security.
NOTEs:
When configuring IS-IS authentication per interface, it is required that the authentication type and password of all devices in the same area or routing domain must be consistent for IS-IS packets to propagate normally.
Regardless of whether area authentication or routing domain authentication is passed, it does not affect the establishment of Level-1 or Level-2 neighbor relationships.
Configuring Authentication for IS-IS Area
When configuring, authentication-type and authentication-key should be submitted in the same commit.
When deleting, the command is delete protocols isis area-tag <text> [vrf <vrf-name>] area-password, and all the area-password configuration of authentication-type and authentication-key will be removed.
To configure the authentication type for the IS-IS area, users can use command set protocols isis area-tag <text> [vrf <vrf-name>] area-password authentication-type <simple | md5>. The authentication type can be simple or md5.
To configure the authentication password for the IS-IS area, users can use command set protocols isis area-tag <text> [vrf <vrf-name>] area-password authentication-key <password>. IS-IS encapsulates authentication information for the sent IS-IS messages and performs authentication checks on the received messages.
By default, IS-IS does not encapsulate authentication information for the sent CSNP and PSNP messages, nor perform authentication checks on the received messages. Users can use command set protocols isis area-tag <text> [vrf <vrf-name>] area-password authenticate-snp <send-only|validate> to change this behavior.
The following commands configure the authentication type, authentication password for the IS-IS area, and configures the system only to encapsulate authentication information for the sent IS-IS messages but will not perform authentication checks on the received messages.
admin@PICOS# set protocols isis area-tag instance1 area-password authentication-type md5
admin@PICOS# set protocols isis area-tag instance1 area-password authentication-key picos123456
admin@PICOS# set protocols isis area-tag instance1 area-password authenticate-snp send-only
admin@PICOS# commit
Configuring Authentication for IS-IS Routing Domain
To configure the authentication type for the IS-IS domain, users can use command set protocols isis area-tag <text> [vrf <vrf-name>] domain-password authentication-type <simple | md5>. The authentication type can be simple or md5.
To configure the authentication password for the IS-IS domain, users can use command set protocols isis area-tag <text> [vrf <vrf-name>] domain-password authentication-key <password>.
By default, IS-IS does not encapsulate authentication information for the sent CSNP and PSNP messages, nor perform authentication checks on the received messages. Users can use command set protocols isis area-tag <text> [vrf <vrf-name>] domain-password authenticate-snp <send-only|validate> to change this behavior.
The following commands configure the authentication type, authentication password for the IS-IS domain, and configures the system only to encapsulate authentication information for the sent IS-IS messages but will not perform authentication checks on the received messages.
admin@PICOS# set protocols isis area-tag instance1 domain-password authentication-type md5
admin@PICOS# set protocols isis area-tag instance1 domain-password authentication-key picos123456
admin@PICOS# set protocols isis area-tag instance1 domain-password authenticate-snp send-only
admin@PICOS# commit
Configuring IS-IS Authentication per Interface
Make sure that the authentication configuration per interface on both ends of IS-IS neighbor is consistent, otherwise neighbors cannot be established.
To configure IS-IS authentication type per interface, users can use command set protocols isis area-tag <text> interface <interface-name> password authentication-type <simple | md5>. The authentication type can be simple or md5.
To configure IS-IS authentication password per interface, users can use command set protocols isis area-tag <text> interface <interface-name> password authentication-key <password>.
The following commands configure the authentication type, authentication password for the IS-IS interface.
admin@PICOS# set protocols isis area-tag instance1 interface vlan10 password authentication-type md5
admin@PICOS# set protocols isis area-tag instance1 interface vlan10 password authentication-key picos123456
admin@PICOS# commit
Copyright © 2024 Pica8 Inc. All Rights Reserved.