07-28-2024 11:39 PM - edited 07-28-2024 11:40 PM
Trying to setup with Segment Routing running IS-IS, wondering is it possible to setup authentication for IS-IS neighbors
Solved! Go to Solution.
07-29-2024 12:16 AM - edited 07-29-2024 12:17 AM
Last time i tested it was working in My Lab for authetication below syntax :
Configure Authentication for IS-IS
This task explains how to configure authentication for IS-IS. This task is optional.
SUMMARY STEPS
configure
router isis instance-id
lsp-password { hmac-md5 | text } { clear | encrypted } password [ level { 1 | 2 }] [ send-only ] [ snp send-only ]
interface type interface-path-id
hello-password { hmac-md5 | text } { clear | encrypted } password [ level { 1 | 2 }] [ send-only ]
Use the commit or end command.
Note : - not tested Segment routing config using password. check should work, but let us know your testing inputs.
07-29-2024 12:32 AM - edited 07-29-2024 12:35 AM
Hello @ThomasCampbell64
Look about domain password. It is used to authenticate IS-IS control plane messages to ensure that only authorized devices can participate in the IS-IS routing domain. This helps in protecting the network from unauthorized devices and potential routing attacks...
This works similar to area authentication expect it is all applied to all routers in the same IS-IS domain. If you do this, authentication will be applied to all routers in the same ID domain. The behavior is the same as area authentication. Hello packets are unauthenticated, LSPs will be authenticated. If you also want to authenticate SNPs, you’ll have to include the authenticate snp validate parameter.
--
R1(config)#router isis
R1(config-router)#domain-password MY_PASSWORD
07-29-2024 12:39 AM - edited 07-29-2024 12:39 AM
While MD5 has been shown to be vulnerable to collision attacks, HMAC-MD5 Hash is still considered secure for message authentication. However, it is recommended to use stronger cryptographic hash functions like SHA-256 or SHA-512 for new applications.
Note that Hashing and encryption are different cryptographic techniques used for different purposes.
HMAC-MD5: HMAC combined with MD5 provides a way to use a secret key with a hash function to ensure data integrity and authenticity. It uses a cryptographic key to produce a hash that is more secure than the hash alone.
Encrypted Password: Cisco's Type-6 encryption uses AES to encrypt the password. This provides strong encryption for the password itself but is different from how the passwords are used for IS-IS authentication, which typically relies on hashing for verifying the integrity and authenticity of the data.
07-29-2024 01:36 AM
do show configuration failed when you have this error message. Share the output.
07-29-2024 12:16 AM - edited 07-29-2024 12:17 AM
Last time i tested it was working in My Lab for authetication below syntax :
Configure Authentication for IS-IS
This task explains how to configure authentication for IS-IS. This task is optional.
SUMMARY STEPS
configure
router isis instance-id
lsp-password { hmac-md5 | text } { clear | encrypted } password [ level { 1 | 2 }] [ send-only ] [ snp send-only ]
interface type interface-path-id
hello-password { hmac-md5 | text } { clear | encrypted } password [ level { 1 | 2 }] [ send-only ]
Use the commit or end command.
Note : - not tested Segment routing config using password. check should work, but let us know your testing inputs.
07-29-2024 12:30 AM
What is the strongest encryption for password authentication? "hmac-md5" or "encrypted"? I heard MD5 encryption has been broken...
07-29-2024 12:39 AM - edited 07-29-2024 12:39 AM
While MD5 has been shown to be vulnerable to collision attacks, HMAC-MD5 Hash is still considered secure for message authentication. However, it is recommended to use stronger cryptographic hash functions like SHA-256 or SHA-512 for new applications.
Note that Hashing and encryption are different cryptographic techniques used for different purposes.
HMAC-MD5: HMAC combined with MD5 provides a way to use a secret key with a hash function to ensure data integrity and authenticity. It uses a cryptographic key to produce a hash that is more secure than the hash alone.
Encrypted Password: Cisco's Type-6 encryption uses AES to encrypt the password. This provides strong encryption for the password itself but is different from how the passwords are used for IS-IS authentication, which typically relies on hashing for verifying the integrity and authenticity of the data.
07-29-2024 12:32 AM - edited 07-29-2024 12:35 AM
Hello @ThomasCampbell64
Look about domain password. It is used to authenticate IS-IS control plane messages to ensure that only authorized devices can participate in the IS-IS routing domain. This helps in protecting the network from unauthorized devices and potential routing attacks...
This works similar to area authentication expect it is all applied to all routers in the same IS-IS domain. If you do this, authentication will be applied to all routers in the same ID domain. The behavior is the same as area authentication. Hello packets are unauthenticated, LSPs will be authenticated. If you also want to authenticate SNPs, you’ll have to include the authenticate snp validate parameter.
--
R1(config)#router isis
R1(config-router)#domain-password MY_PASSWORD
07-29-2024 01:31 AM - edited 07-29-2024 01:32 AM
I found this article:
Trying to set a key-string for IS-IS using HMAC-SHA256 but keep getting an error...
07-29-2024 01:36 AM
do show configuration failed when you have this error message. Share the output.
07-29-2024 01:43 AM
07-29-2024 01:59 AM
Check the version of code running (the one not working vs working)
07-29-2024 01:41 AM
the screenshot show something failed, so either come out and look for the command as suggested to see what is wrong.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide