[c-nsp] IOS-XR IS-IS authentication
Dave Bell
dave at geordish.org
Wed May 27 08:00:12 EDT 2020
Keychain for XR would help too..
key chain ISIS-DOMAIN
key 1
accept-lifetime 00:00:00 january 01 2020 infinite
key-string password <PASSWORD>
send-lifetime 00:00:00 january 01 2020 infinite
cryptographic-algorithm HMAC-MD5
On Wed, 27 May 2020 at 12:58, Dave Bell <dave at geordish.org> wrote:
> We've just turned up something similar. The difference is we are not using
> a keychain for the P2P password.
>
> >show configuration protocols isis
> topologies ipv6-unicast;
> overload timeout 300;
> level 1 disable;
> level 2 {
> authentication-key-chain ISIS_DOMAIN;
> wide-metrics-only;
> }
> interface ae6.0 {
> ldp-synchronization;
> lsp-interval 50;
> point-to-point;
> link-protection;
> level 2 {
> metric 10000;
> ipv6-unicast-metric 10000;
> hello-authentication-key "<password>"; ## SECRET-DATA
> hello-authentication-type md5;
> }
> }
>
> > show configuration security
> authentication-key-chains {
> key-chain ISIS_DOMAIN {
> key 1 {
> secret "<PASSWORD>; ## SECRET-DATA
> start-time "2019-1-1.00:00:00 +0000";
> algorithm md5;
> }
> }
> }
>
>
>
> router isis ISIS
> set-overload-bit on-startup wait-for-bgp
> is-type level-2-only
> net 49.0001.0511.4807.2051.00
> lsp-password keychain ISIS-DOMAIN
> address-family ipv4 unicast
> metric-style wide level 2
> maximum-paths 8
> segment-routing mpls
> !
> address-family ipv6 unicast
> metric-style wide level 2
> maximum-paths 8
> !
> interface Bundle-Ether1
> hello-password hmac-md5 encrypted <PASSWORD>
> address-family ipv4 unicast
> metric 10000
>
> On Wed, 27 May 2020 at 12:46, Eric Van Tol <eric at atlantech.net> wrote:
>
>> Sorry if this is a duplicate – Outlook chose the ‘bounces’ address as the
>> one to send to and I didn’t notice.
>>
>> Hi all,
>> I’m testing out an NCS540 for use in our network and this is my first
>> foray into IOS-XR. We have a mix of Juniper and Cisco IOS/IOS-XE devices
>> that the NCS needs to interoperate with. I’m having some minor trouble with
>> IS-IS authentication and it’s kind of driving me nuts because I can’t get
>> IS-IS to come up when authentication is configured. I keep getting this
>> error:
>>
>> BAD P2P IIH rcvd from TenGigE0/0/0/19 SNPA 5c5e.abde.1e00: dropped
>> because cryptographic password mismatch
>>
>> Seems pretty obvious, but my keychain key password is configured and
>> verified to match on both sides:
>>
>> key chain isis-chain
>> key 1
>> accept-lifetime 00:00:00 january 01 1993 infinite
>> key-string password <password>
>> send-lifetime 00:00:00 january 01 1993 infinite
>> cryptographic-algorithm HMAC-MD5
>> !
>> accept-tolerance infinite
>>
>> I’ve tried both MD5 and HMAC-MD5, neither works. Here is my IS-IS config
>> on the NCS540:
>>
>> router isis rtr1
>> set-overload-bit on-startup wait-for-bgp
>> is-type level-2-only
>> net 49.0001.1071.3820.2192.00
>> log adjacency changes
>> lsp-mtu 1497
>> lsp-password keychain isis-chain
>> address-family ipv4 unicast
>> metric-style wide level 2
>> !
>> address-family ipv6 unicast
>> metric-style wide level 2
>> single-topology
>> !
>> interface Loopback1
>> passive
>> address-family ipv4 unicast
>> !
>> address-family ipv6 unicast
>> !
>> !
>> interface TenGigE0/0/0/19
>> circuit-type level-2-only
>> point-to-point
>> hello-password keychain isis-chain
>> address-family ipv4 unicast
>> metric 3500
>> !
>> address-family ipv6 unicast
>> metric 3500
>> !
>> !
>>
>> traceoptions on the Juniper shows something similar:
>>
>> ERROR: IIH from 1071.3820.2192 on xe-0/0/0.0 failed authentication
>>
>> Here’s the Juniper key config and isis stanza:
>>
>> authentication-key-chains {
>> key-chain isis-chain {
>> key 1 {
>> secret "<password>"; ## SECRET-DATA
>> start-time "1993-1-1.00:00:00 +0000";
>> algorithm md5;
>> }
>> }
>> }
>> protocols {
>> isis {
>> level 1 disable;
>> level 2 {
>> authentication-key-chain isis-chain;
>> wide-metrics-only;
>> }
>> interface xe-0/0/0.0 {
>> point-to-point;
>> level 2 {
>> metric 3500;
>> hello-authentication-key-chain isis-chain;
>> }
>> level 1 disable;
>> }
>> }
>>
>> I know it’s got to be something simple, but it’s not clicking for me
>> today. It seems like any step forward I take with IOS-XR, I end up taking
>> two steps back on the next thing that ‘just works’ everywhere else.
>>
>> -evt
>> _______________________________________________
>> cisco-nsp mailing list cisco-nsp at puck.nether.net
>> https://puck.nether.net/mailman/listinfo/cisco-nsp
>> archive at http://puck.nether.net/pipermail/cisco-nsp/
>>
>
More information about the cisco-nsp
mailing list