Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

Navigation
 

Related Documentation

 

authentication (BGP BFD Liveness Detection)

Syntax

authentication {algorithm algorithm-name;key-chain key-chain-name;loose-check ;}

Hierarchy Level

[edit logical-systems logical-system-name protocols bgp bfd-liveness-detection],[edit logical-systems logical-system-name protocols bgp group group-name bfd-liveness-detection],[edit logical-systems logical-system-name protocols bgp group group-name neighbor address bfd-liveness-detection],[edit logical-systems logical-system-name routing-instances routing-instance-name protocols bgp bfd-liveness-detection],[edit logical-systems logical-system-name routing-instances routing-instance-name protocols bgp group group-name bfd-liveness-detection],[edit logical-systems logical-system-name routing-instances routing-instance-name protocols bgp group group-name neighbor address bfd-liveness-detection],[edit protocols bgp bgp bfd-liveness-detection],[edit protocols bgp group group-name bfd-liveness-detection],[edit protocols bgp group group-name neighbor address bfd-liveness-detection],[edit routing-instances routing-instance-name protocols bgp bfd-liveness-detection],[edit routing-instances routing-instance-name protocols bgp group group-name bfd-liveness-detection],[edit routing-instances routing-instance-name protocols bgp group group-name neighbor address bfd-liveness-detection]

Release Information

Statement introduced in Junos OS Release 8.1.

Statement introduced in Junos OS Release 9.0 for EX Series switches.

Support for BFD authentication introduced in Junos OS Release 9.6.

Statement introduced in Junos OS Release 12.1 for the QFX Series.

Description

Specify the router and route authentication to mitigate the risk of being attacked by a machine or router that has been configured to share incorrect routing information with another router. Router and route authentication enables routers to share information only if they can verify that they are talking to a trusted source, based on a password (key). In this method, a hashed key is sent along with the route being sent to another router. The receiving router compares the sent key to its own configured key. If they are the same, the receiving router accepts the route.

The remaining statements are explained separately.

Required Privilege Level

routing—To view this statement in the configuration.

routing-control—To add this statement to the configuration.

 

Related Documentation

 

Published: 2013-08-15

 

Related Documentation

 

Published: 2013-08-15