O'Reilly logo

CCIE Practical Studies: Security (CCIE Self-Study) by Raymond Morrow, Andrew G. Mason, Dmitry Bokotey

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Configuring IS-IS Authentication

IS-IS gives you three options for authentication of LSPs—authentication of a specified interface or link, of an area, or of a domain—and can be used in combinations of the three. Routers that want to become neighbors must exchange the same password for the level of authentication that is configured on the router. Currently, IS-IS supports only a simple password mechanism that does not guarantee against hostile attacks. However, authentication functions are extensible, so a stronger cryptographically based security scheme can be added in the future.

The authentication information is encoded as a Type Length Value (TLV) triple in the LSP. The type of the authentication TLV is 10, the length of the TLV is variable, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required