authentication (BGP BFD Liveness Detection)
Syntax
authentication { algorithm algorithm-name; key-chain key-chain-name; loose-check; }
Hierarchy Level
[edit logical-systems name protocols bgp bfd-liveness-detection], [edit logical-systems name protocols bgp group name bfd-liveness-detection], [edit logical-systems name protocols bgp group name neighbor address bfd-liveness-detection], [edit logical-systems name routing-instances name protocols bgp bfd-liveness-detection], [edit logical-systems name routing-instances name protocols bgp group name bfd-liveness-detection], [edit logical-systems name routing-instances name protocols bgp group name neighbor address bfd-liveness-detection], [edit logical-systems name tenants name routing-instances name protocols bgp bfd-liveness-detection], [edit logical-systems name tenants name routing-instances name protocols bgp group name bfd-liveness-detection], [edit logical-systems name tenants name routing-instances name protocols bgp group name neighbor address bfd-liveness-detection], [edit protocols bgp bfd-liveness-detection], [edit protocols bgp group name bfd-liveness-detection], [edit protocols bgp group name neighbor address bfd-liveness-detection], [edit routing-instances name protocols bgp bfd-liveness-detection], [edit routing-instances name protocols bgp group name bfd-liveness-detection], [edit routing-instances name protocols bgp group name neighbor address bfd-liveness-detection], [edit tenants name routing-instances name protocols bgp bfd-liveness-detection] [edit tenants name routing-instances name protocols bgp group name bfd-liveness-detection] [edit tenants name routing-instances name protocols bgp group name neighbor address bfd-liveness-detection]
Description
Specify the router and route authentication to mitigate the risk of being attacked by a machine or router that has been configured to share incorrect routing information with another router. Router and route authentication enables routers to share information only if they can verify that they are talking to a trusted source, based on a password (key). In this method, a hashed key is sent along with the route being sent to another router. The receiving router compares the sent key to its own configured key. If they are the same, the receiving router accepts the route.
Options
authentication algorithm-name | Configure the algorithm used to authenticate the specified BFD session.
|
key-chain key-chain-name | Specify the name of an authentication
keychain. The keychain name must match one of the keychains configured
with the The authentication keychain associates a security key with the specified BFD session. Each key has a unique start time within the keychain. Keychain authentication allows you to change the password information periodically without bringing down peering sessions. This keychain authentication method is referred to as hitless because the keys roll over from one to the next without resetting any peering sessions or interrupting the routing protocol. |
loose-check | Specify loose authentication checking on the BFD session. Use loose authentication for transitional periods only when authentication might not be configured at both ends of the BFD session. By default, strict authentication is enabled and authentication is checked at both ends of each BFD session. Optionally, to smooth migration from non-authenticated sessions to authenticated sessions, you can configure loose checking. When loose checking is configured, packets are accepted without authentication being checked at each end of the session.
|
Required Privilege Level
routing—To view this statement in the configuration.
routing-control—To add this statement to the configuration.
Release Information
Statement introduced in Junos OS Release 8.1.
Support for BFD authentication introduced in Junos OS Release 9.6.