About TCP Authentication Option
With TCP Authentication Option (TCP-AO), defined in RFC 5925, you can protect long-lived TCP connections against replays using stronger Message Authentication Codes (MACs).
TCP-AO is the proposed replacement for TCP MD5, defined in RFC 2385. Unlike TCP MD5, TCP-AO is resistant to collision attacks and provides algorithmic agility and support for key management.
TCP-AO has the following distinct features:
-
TCP-AO supports the use of stronger Message Authentication Codes (MACs) to enhance the security of long-lived TCP connections.
-
TCP-AO protects against replays for long-lived TCP connections, and coordinates key changes between endpoints by providing a more explicit key management.
TCP-AO deprecates TCP MD5 however to support legacy TCP peers, NXOS and BGP will continue to support TCP-MD5 for legacy peers. However, a configuration in which one of the devices is configured with the TCP MD5 option and the other with the TCP-AO option is not supported.