Alcatel-Lucent 6850-48 Guida Di Riferimento

Pagina di 3444
IS-IS Commands
OmniSwitch CLI Reference Guide
September 2009
page 43-65
ip isis interface hello-auth-type
Configures the authentication of Hello PDUs on a specific interface.
ip isis interface interface_name hello-auth-type {simple {key key | encrypt-key encrypt-key} | md5 {key 
key | encrypt-key encrypt-key} | none}
Syntax Definitions
 interface_name
The name of the interface.
simple 
Simple authentication will be used. 
md5 
Specifies that MD5 authentication algorithm will be used. Hash-key will 
be used in MD5 authentication.
key
Key will be plain text ASCII up to 118 characters. Use quotes around 
string if the key contains multiple words with spaces between them.
encrypt-key
The key in hexadecimal format to provide security consideration on the 
authentication key. Configuration snapshot always displays authentica-
tion key in the encrypted form.
none
No authentication will be used.
Defaults
Platforms Supported
OmniSwitch 6850, 9000, 9000E
Usage Guidelines
• Simple authentication uses only a text string as the password in the packet. This helps to protect the 
routers from a configuration mishap. MD5 authentication is used to protect the system from malicious 
actions. 
• MD5 authentication is used to encrypt the information that is sent over the network. MD5 authentica-
tion uses shared secret key.
 
The Key is used to sign the packets with an MD5 checksum to sign the 
packet, so that the packets cannot be tampered. As the key is not included in the packet, snooping the 
key is not possible. 
• Use the Key parameter to configure the password for Simple or MD5 authentication. Alternatively, use 
the encrypt-key parameter to configure the password by supplying the encrypted form of the password 
as the encrypt-key.
 
The Configuration snapshot always displays the password in the encrypted form.
 
You should use only this key parameter during the CLI configuration.
• If the encrypt-key parameter is used to configure the password through the CLI, then its value should 
be the same as the one that appears in the configuration snapshot. Only valid system generated values 
are accepted as encrypt-key. 
parameter
default
simple md5 none
none