Administrator Guide

3DES - 48 or 96 hex digits; DES - 16 or 32 hex digits; AES-CBC -32 or 64 hex digits for
AES-128 and 48 or 96 hex digits for AES-192.
authentication-
algorithm
Specifies the authentication algorithm to use for encryption. Valid values are MD5 or
SHA1.
key-encryption-
type
(OPTIONAL) Specifies if the authentication key is encrypted.
Valid values: 0 (key is not encrypted) or 7 (key is encrypted).
key
Text string used in authentication.
For MD5 authentication, the key must be 32 hex digits (non-encrypted) or 64 hex digits
(encrypted).
For SHA-1 authentication, the key must be 40 hex digits (non-encrypted) or 80 hex digits
(encrypted).
Defaults Not configured.
Command Modes INTERFACE
Command History
This guide is platform-specific. For command information about other platforms, refer to the relevant Dell
Networking OS Command Line Reference Guide.
The following is a list of the Dell Networking OS version history for this command.
Version Description
9.9(0.0) Introduced on the C9010.
9.2(1.0) Introduced on the Z9500.
9.1.(0.0) Introduced on the S4810 and Z9000.
8.4.2.0 Introduced on the E-Series TeraScale.
8.3.19.0 Introduced on the S4820T.
Usage Information
Before you enable IPsec encryption on an OSPFv3 interface, first enable IPv6 unicast routing globally, configure
an IPv6 address and enable OSPFv3 on the interface, and assign the interface to an area.
An SPI value must be unique to one IPsec security policy (authentication or encryption) on the router. Configure
the same encryption policy (same SPI and key) on each OSPFv3 interface in a link.
To remove an IPsec encryption policy from an interface, enter the no ipv6 ospf encryption spi
number command. To remove null authentication on an interface to allow the interface to inherit the
authentication policy configured for the OSPFv3 area, enter the no ipv6 ospf no ipv6 ospf
encryption null command.
Related
Commands
area encryption – configures an IPsec encryption policy for an OSPFv3 area.
show crypto ipsec policy – displays the configuration of IPsec encryption policies.
show crypto ipsec sa ipv6 – displays the security associations set up for OSPFv3 interfaces in encryption policies.
ipv6 ospf graceful-restart helper-reject
Configure an OSPFv3 interface to not act upon the Grace LSAs that it receives from a restarting OSPFv3 neighbor.
C9000 Series
Syntax
ipv6 ospf graceful-restart helper-reject
To disable the helper-reject role, enter no ipv6 ospf graceful-restart helper-reject.
Defaults The helper-reject role is not configured.
Command Modes INTERFACE
1154 Open Shortest Path First (OSPFv2 and OSPFv3)