We're Sorry, Full Content Access is for Members Only...

If you like to keep on reading, Become a Member Now! Here is why:

  • Learn any CCNA, CCNP and CCIE R&S Topic. Explained As Simple As Possible.
  • Try for Just $1. The Best Dollar You've Ever Spent on Your Cisco Career!
  • Full Access to our 651 Lessons. More Lessons Added Every Week!
  • Content created by Rene Molenaar (CCIE #41726)

451 Sign Ups in the last 30 days

100% Satisfaction Guaranteed!
You may cancel your monthly membership at any time.
No Questions Asked!


Forum Replies

  1. Rene, do you have IPSEC lesson?

  2. Is the “0” or “7” option relating to whether or not the running-config file saves the key as encrypted or clear text?

  3. Hello Chris

    Options 0 and 7 refer to whether or not the key that is sent between the routers during the authentication process is encrypted. In order to encrypt the key in the configuration file, use the system password-encryption command. This command encrypts authentication key passwords among others.

    I hope this has been helpful!


  4. Hi,
    does this means IPsec is the only way to authenticate in OSPFv3?
    I tried with the following and it worked:

    R2#interface Ethernet0/0
    no ip address
    ipv6 address 2001::2/64
    ospfv3 1 authentication key-chain CISCO
    ospfv3 1 ipv6 area 0
    R2#show ospfv3 ipv6
    OSPFv3 1 address-family ipv6
    Router ID
    Active Key-chains:
      Key chain CISCO: Send key 1, Algorithm HMAC-SHA-1, Number of interfaces 1
        Area BACKBONE(0)


    Edit: This post gives the idea that OSPFv3 does not support any authentication beside IPsec, but after checking it does support t

    ... Continue reading in our forum

2 more replies! Ask a question or join the discussion by visiting our Community Forum