03-12-2025 11:59 AM - edited 03-12-2025 12:00 PM
Hi all,
So I'm configuring ISIS authenticaton between an IOS-XE device and an IOS-XR device.
I made a mistake in my configuration in that I left out the line `cryptographic algorithm md5` on the IOS-XE (see config below).
But the ISIS came up! Routes were exchanged and LSDB was populated accordingly.
Shouldn't the mismatch cause the IOS-XR device to reject the peering because the IIH packets don't have a proper cryptographic algorithm applied? Seems pointless if I configure my XR with authenticaton to prevent malicious neighbors from peering with me and in order to get around that all I have to do is leave the cryptographic algorithm off the XE side....
IOS-XE SIDE
===============
router isis ISIS1
net 49.0001.0001.1111.0200.0002.00
is-type level-2-only
authentication mode md5 level-2
authentication key-chain ISIS-KEY level-2
metric-style wide
<snip>
interface GigabitEthernet1
<snip>
ip router isis ISIS1
ipv6 router isis ISIS1
isis network point-to-point
isis authentication mode md5
isis authentication key-chain ISIS-KEY
key chain ISIS-KEY
key 1
key-string pa55w0rd
accept-lifetime 18:00:00 Mar 1 2025 infinite
send-lifetime 18:00:00 Mar 1 2025 infinite
<<MISSING CRYPTO ALGO>>
IOS-XR SIDE
=============
key chain ISIS-KEY
key 1
accept-lifetime 18:00:00 march 1 2025 infinite
key-string password 1227721321350FDW
send-lifetime 18:00:00 march 1 2025 infinite
cryptographic-algorithm HMAC-MD5
!
accept-tolerance infinite
!
router isis ISIS1
is-type level-2-only
net 49.0001.1111.0000.0200.0003.00
lsp-password keychain ISIS-KEY
address-family ipv4 unicast
metric-style wide
!
address-family ipv6 unicast
metric-style wide
!
<snip>
interface GigabitEthernet0/0/0/3
point-to-point
hello-password keychain ISIS-KEY
address-family ipv4 unicast
!
address-family ipv6 unicast
!
!
!
XE-RTR#sh isis neighbors
Tag CORE:
System Id Type Interface IP Address State Holdtime Circuit Id
XR-RTR L2 Gi1 10.10.39.3 UP 28 00
XE-RTR#
03-12-2025 01:41 PM
Hi @steven.crutchley ,
It works because on the IOS-XE side the "isis authentication mode" configured on the interface overrides the algorithm configured for the key chain. If you want the algorithm from the key chain to take effect, you need to remove the "isis authentication mode" from the interface.
Regards,
Harold
03-13-2025 07:33 AM
So with this configuration the XE side is not using a key chain at all?
03-13-2025 08:52 AM
Hi @steven.crutchley ,
Yes, it is using the key chain, but the algorithm from the "isis authentication mode md5" overrides whatever is configured in the key chain.
Regards,
Harold
03-13-2025 01:10 PM - edited 03-13-2025 01:12 PM
So I've been running tests to determine what exact combination works for configuring key chain authentication.
See the attached image for a spreadsheet of what works.
By looking at the combination's that work I have determined the following if IOS-XE and IOS-XR are to perform IS-IS authentication using key chains:
This result has confused me a bit...
Firstly, it only works with with MD5 on IOS-XE and HMAC-MD5 on IOS-XR but not MD5 on both?
Secondly, is there no way to make the cryptographic algorithm listed under the key chain on the XE take effect?
I'm also seeing these logs on the IOS-XE when the neighborship is up:
*Mar 13 20:06:31.731: ISIS-AuthInfo (CORE): IIH no change, use the same hmac value
I'm not sure what that means...
Is this the correct way to run key chains on IS-IS between IOS-XE and IOS-XR? It seems kinda messy to me.
(for reference I'm using IOS-XE Version 16.9.4 and IOS-XR 7.3.2)
03-13-2025 03:26 PM - edited 03-13-2025 03:36 PM
Hi @steven.crutchley ,
I am seeing a different behavior testing with 17.3.8.
> isis authentication mode md5` and `isis authentication key-chain <name>` must both be present under the interface on > the IOS-XE device.
The "isis authentication key-chain" can be configured without the "isis authentication mode". The authentication mode is picked up from the key chain.
> The encryption algorithm on the IOS-XE key chain doesn't matter - presumably because `isis authentication mode md5` > overrides it (in fact I've tested with the key chain on IOS-XE have no crypto algorithm and it still works).
If the "isis authentication mode md5" is configured, it overrides the algo from the key chain. Otherwise, the algo configured in the key chain is applied. Supported algos are md5, hmac-sha1, hmac-sha-256, hmac-sha-384 and hmac-sha-512.
> Firstly, it only works with with MD5 on IOS-XE and HMAC-MD5 on IOS-XR but not MD5 on both?
This is because the md5 parameter on the IOS-XE side is really hmac-md5.
> Secondly, is there no way to make the cryptographic algorithm listed under the key chain on the XE take effect?
As I mentioned, with the version I am testing with (17.3.8), you simply need to remove the "isis authentication mode" from the interface for the authentication mode configured in the key chain to take effect.
> *Mar 13 20:06:31.731: ISIS-AuthInfo (CORE): IIH no change, use the same hmac value
Not sure what it means either, but I do not see any of these messages with 17.3.8.
> Is this the correct way to run key chains on IS-IS between IOS-XE and IOS-XR? It seems kinda messy to me.
I would definitely recommend moving to a more recent IOS-XE version. It is cleaner and more flexible.
03-31-2025 08:47 AM - edited 03-31-2025 09:32 AM
Hello friends. Just adding to what has already been well explained: In my test lab, I use the iOS XE version 17.03.05, and it is not necessary to use ISIS authentication mode MD5 on the adjacency interfaces, and it is also not necessary to use authentication mode MD5 under the ISIS instance. However, in my CCIE SP exam, in a certain task it was necessary to use them. I do not remember the iOS XE version of the exam.
Best Regards,
Joéster Brondani
CCIE #67731 (SP, EI) , CCDE #20240136
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide