cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
3134
Views
3
Helpful
4
Replies

ISIS Hello-Password with Keychain

nonamer15
Level 1
Level 1

I'm unable to get any neighbor adjacencies with ISIS when using a hello-password with a keychain. However, if I just use an encrypted hello-password, everything works as expected. Is a keychain not supported or is there some additional commands to make this work?

 

Below is a topology diagram. I'm using XR nodes running 6.1.2. I've also tried using actual hardware running 6.5.1 with the same results.

isis.JPG

 

Here's the configuration without the keychain and everything works as expected.

hostname R1
key chain ISIS-KEY
 key 1
  key-string password 10460C15091843595F50
  cryptographic-algorithm HMAC-MD5
 !
!
interface Loopback0
 ipv4 address 11.11.11.11 255.255.255.255
!
interface MgmtEth0/0/CPU0/0
 shutdown
!
interface GigabitEthernet0/0/0/0
 ipv4 address 1.1.1.1 255.255.255.0
!
router isis iroute
 net 49.1001.0010.0100.1001.00
 interface Loopback0
  address-family ipv4 unicast
  !
 !
 interface GigabitEthernet0/0/0/0
  hello-password hmac-md5 encrypted 10460C15091843595F50
  address-family ipv4 unicast
  !
 !
!
end



hostname R2
key chain ISIS-KEY
 key 1
  key-string password 10460C15091843595F50
  cryptographic-algorithm HMAC-MD5
 !
!
interface Loopback0
 ipv4 address 22.22.22.22 255.255.255.255
!
interface MgmtEth0/0/CPU0/0
 shutdown
!
interface GigabitEthernet0/0/0/0
 ipv4 address 1.1.1.2 255.255.255.0
!
router isis iroute
 net 49.2002.0020.0200.2002.00
 interface Loopback0
  address-family ipv4 unicast
  !
 !
 interface GigabitEthernet0/0/0/0
  hello-password hmac-md5 encrypted 10460C15091843595F50
  address-family ipv4 unicast
  !
 !
!
end

 

Below is the configuration with the keychain and I'm unable to see neighbors or routes. The only difference is the hello-password keychain ISIS-KEY command.

hostname R1
key chain ISIS-KEY
 key 1
  key-string password 10460C15091843595F50
  cryptographic-algorithm HMAC-MD5
 !
!
interface Loopback0
 ipv4 address 11.11.11.11 255.255.255.255
!
interface MgmtEth0/0/CPU0/0
 shutdown
!
interface GigabitEthernet0/0/0/0
 ipv4 address 1.1.1.1 255.255.255.0
!
router isis iroute
 net 49.1001.0010.0100.1001.00
 interface Loopback0
  address-family ipv4 unicast
  !
 !
 interface GigabitEthernet0/0/0/0
  hello-password keychain ISIS-KEY
  address-family ipv4 unicast
  !
 !
!
end



hostname R2
key chain ISIS-KEY
 key 1
  key-string password 10460C15091843595F50
  cryptographic-algorithm HMAC-MD5
 !
!
interface Loopback0
 ipv4 address 22.22.22.22 255.255.255.255
!
interface MgmtEth0/0/CPU0/0
 shutdown
!
interface GigabitEthernet0/0/0/0
 ipv4 address 1.1.1.2 255.255.255.0
!
router isis iroute
 net 49.2002.0020.0200.2002.00
 interface Loopback0
  address-family ipv4 unicast
  !
 !
 interface GigabitEthernet0/0/0/0
  hello-password keychain ISIS-KEY
  address-family ipv4 unicast
  !
 !
!
end

 

4 Replies 4

nishetti
Cisco Employee
Cisco Employee

enable 'terminal monitor'
You should see below error message:
isis[1013]: %ROUTING-ISIS-5-AUTH_FAILURE_DROP : Dropped P2P IIH from Bundle-Ether11 SNPA 6c9c.ed2c.d95b due to authentication TLV not found

To resolve this use below command under the isis interface config:
hello-password keychain ISIS-KEY send-only

Hello @nishetti 

could you please tell is why we should use one way authentication. This ios-xr bug or something special ?

Br

Rashad Y.

Krishan
Level 1
Level 1

This command has solved the issue in my setup. Thanks a lot.

Redmist
Level 1
Level 1

Hi,

I think the issue is with the key. In XR unless you configure the send-lifetime and the accept-lifetime then the key isnt 'valid'. so wont be used. In the above example if you configure the following it should work

key chain ISIS-KEY
 key 1
  key-string password 10460C15091843595F50
  cryptographic-algorithm HMAC-MD5
send-lifetime 00:00:00 november 01 1993 infinite
accept-lifetime 00:00:00 november 01 1993 infinite

 You can verify the keys with  - show key chain ISIS-KEY

Hope this helps