- Integrated IS-IS Routing Protocol Overview
- Configuring a Basic IS-IS Network
- Customizing IS-IS for Your Network Design
- IS-IS MIB
- IS-IS Support for an IS-IS Instance per VRF for IP
- Overview of IS-IS Fast Convergence
- Setting Best Practice Parameters for IS-IS Fast Convergence
- Reducing Failure Detection Times in IS-IS Networks
- Reducing Link Failure and Topology Change Notification Times in IS-IS Networks
- Reducing Alternate-Path Calculation Times in IS-IS Networks
- Enhancing Security in an IS-IS Network
- Finding Feature Information
- Prerequisites for Enhancing Security in an IS-IS Network
- Information About Enhancing Security in an IS-IS Network
- Setting an Authentication Password for each Interface
- Setting a Password at Level 1
- Setting a Password at Level 2
- Configuring IS-IS Authentication
Enhancing Security in an IS-IS Network
This module describes processes that you can follow to enhance network security when you use Intermediate System-to-Intermediate System (IS-IS) in your network. You can set passwords, prevent unauthorized routers from forming adjacencies with routers in your IS-IS network, and use the IS-IS HMAC-MD5 Authentication and Enhanced Clear Text Authentication feature.
- Finding Feature Information
- Prerequisites for Enhancing Security in an IS-IS Network
- Information About Enhancing Security in an IS-IS Network
- How to Enhance Security in an IS-IS Network
- Configuration Examples for Enhancing Security in an IS-IS Network
- Additional References
- Feature Information for Enhancing Security in an IS-IS Network
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the Feature Information Table at the end of this document.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
Prerequisites for Enhancing Security in an IS-IS Network
Information About Enhancing Security in an IS-IS Network
Importance of Preventing Unauthorized Information from Entering an IS-IS Network
It is recommended that you configure the security features described in this module in order to prevent unauthorized routing messages from being placed into the network routing domain. You can set an authentication password for each interface, as well as set an area password for each IS-IS area to prevent unauthorized routers from injecting false routing information into the link-state database, or you can configure a type of IS-IS authentication--either IS-IS HMAC-MD5 or enhanced clear text authentication.
The following sections describe configuration tasks for IS-IS authentication. Two types of authentication are supported: IS-IS HMAC-MD5 and clear text. The task you perform depends on whether you are introducing authentication or migrating from an existing authentication scheme.
Before you can configure authentication, you must make the following decisions:
- Whether to configure authentication for the IS-IS instance and/or for individual IS-IS interfaces (both tasks are included in this section).
- At what level(s) authentication is to be used.
- What type of authentication (IS-IS HMAC-MD5 or clear text) is to be used.
- IS-IS Authentication Functionality
- Benefits of IS-IS Clear Text Authentication
- Benefits of IS-IS HMAC-MD5 Authentication
IS-IS Authentication Functionality
New style IS-IS authentication (IS-IS HMAC-MD5 and clear text) provides a number of advantages over the old style password configuration commands that were described in the previous sections, "Setting an Authentication Password for each Interface" and "Setting a Password at Level 1".
- Passwords are encrypted when the software configuration is displayed.
- Passwords are easier to manage and change.
- Passwords can be rolled over to new passwords without disrupting network operations.
- Non-disruptive authentication transitions are supported by allowing configuration which allowed the router to accept PDUs without authentication or with stale authentication information, yet send PDUs with current authentication. Such transitions are useful when you are migrating from no authentication to some type of authentication, when you are changing authentication type, and when you are changing keys.
IS-IS has five PDU types: link state PDU (LSP), LAN Hello, Point-to-Point Hello, complete sequence number PDU (CSNP), and partial sequence number PDU (PSNP). IS-IS HMAC-MD5 authentication or clear text password authentication can be applied to all five PDU types. The authentication can be enabled on different IS-IS levels independently. The interface-related PDUs (LAN Hello, Point-to-Point Hello, CSNP, and PSNP) can be enabled with authentication on different interfaces, with different levels and different passwords.
Either authentication mode or old password mode may be configured on a given scope (IS-IS instance or interface) and level--bit not both. However, different modes may be configured for different modes mat be configured for different scopes or levels. If mixed modes are intended, different keys should be used for different modes in order not to compromise the encrypted password in the PDUs.
Benefits of IS-IS Clear Text Authentication
IS-IS clear text (plain text) authentication provides the same functionality as is provided by using the area-password or domain-password command. However, use of clear text authentication takes advantage of the more flexible key management capabilities described above.
Benefits of IS-IS HMAC-MD5 Authentication
- IS-IS now supports MD5 authentication, which is more secure than clear text authentication. IS-IS HMAC-MD5 authentication adds an HMAC-MD5 digest to each IS-IS protocol data unit (PDU). HMAC is a mechanism for message authentication codes (MACs) using cryptographic hash functions. The digest allows authentication at the IS-IS routing protocol level, which prevents unauthorized routing messages from being injected into the network routing domain.
- MD5 authentication or clear text authentication can be enabled on Level 1 or Level 2 independently.
- Passwords can be rolled over to new passwords without disrupting routing messages.
- For the purpose of network transition, you can configure the networking device to accept PDUs without authentication or with wrong authentication information, yet send PDUs with authentication. Such transition might be because you are migrating from no authentication to some type of authentication, you are changing authentication type, or you are changing keys.
Before you migrate from using one type of security authentication to another, all routers must be loaded with the new image that supports the new authentication type. The routers will continue to use the original authentication method until all routers have been loaded with the new image that supports the new authentication method, and all routers have been configured to use the new authentication method. Once all routers are loaded with the required image, you must follow the configuration steps for the desired new authentication method as described in the previous Configuring HMAC-MD5 or Clear Text Authentication for the IS-IS Instance. You also must decide whether to configure authentication for the IS-IS area or for individual IS-IS interfaces. Both tasks are included in the referenced section.
Note |
To achieve a smooth transition from one authentication method to another, allowing for continuous authentication of IS-IS PDUs, perform the task steps in the order shown, which requires moving from router to router doing certain steps before all the steps are performed on any one router. |
- Migration from Old Clear Text Authentication to HMAC-MD5 Authentication
- Migration from Old Clear Text Authentication to the New Clear Text Authentication
Migration from Old Clear Text Authentication to HMAC-MD5 Authentication
When you configure MD5 authentication, the area-password and domain-password command settings will be overridden automatically with the new authentication commands. When you configure MD5 authentication, the isis password command setting will be overridden automatically with the new authentication commands.
Migration from Old Clear Text Authentication to the New Clear Text Authentication
The benefits of migrating from the old method of clear text authentication to the new method of clear text authentication are as follows:
- Passwords are easier to change and maintain.
- Passwords can be encrypted when the system configuration is being displayed (if you use key management).
How to Enhance Security in an IS-IS Network
- Setting an Authentication Password for each Interface
- Setting a Password at Level 1
- Setting a Password at Level 2
- Configuring IS-IS Authentication
Setting an Authentication Password for each Interface
Note |
The password is exchanged as plain text and thus provides only limited security. |
DETAILED STEPS
Setting a Password at Level 1
Note |
This password is exchanged as plain text, and, thus, this feature provides only limited security. |
DETAILED STEPS
Setting a Password at Level 2
Note |
This password is exchanged as plain text, and, thus, this feature provides only limited security. |
DETAILED STEPS
Configuring IS-IS Authentication
- Configuring HMAC-MD5 Authentication or Clear Text Authentication for the First Time
- Migrating to a New Authentication Type
- Configuring Authentication on a New Router Being Added to a Network That Already Has Authentication Configured
Configuring HMAC-MD5 Authentication or Clear Text Authentication for the First Time
- Configuring HMAC-MD5 or Clear Text Authentication for the IS-IS Instance
- Configuring HMAC-MD5 or Clear Text Authentication for an IS-IS Interface
Configuring HMAC-MD5 or Clear Text Authentication for the IS-IS Instance
In order to use HMAC-MD5 or clear text authentication with encrypted keys, the Integrated IS-IS routing protocol must be configured.
DETAILED STEPS
Command or Action | Purpose | |
---|---|---|
|
Example: Router> enable |
Enables privileged EXEC mode.
|
|
Example: Router# configure terminal |
Enters global configuration mode. |
|
Example: Router(config)# key chain remote3754 |
Enables authentication for routing protocols and identifies a group of authentication keys. |
|
Example: Router(config-keychain)# key 100 |
Identifies an authentication key on a key chain.
|
|
Example: Router(config-keychain-key)# key-string mno172 |
Specifies the authentication string for a key.
|
|
Example: Router(config-keychain-key)# exit |
Returns to keychain configuration mode. |
|
Example: Router(config-keychain)# exit |
Returns to global configuration mode. |
|
Example: Router(config)# router isis 1 |
Enables IS-IS as an IP routing protocol and assigns a tag to a process, if required.
|
|
Example: Router(config-router)# authentication send-only |
Specifies for the IS-IS instance that MD5 authentication is performed only on IS-IS PDUs being sent (not received). |
|
|
Use the same key string on each router. |
|
Example: Router(config-router)# authentication mode md5 |
Specifies the type of authentication used in IS-IS PDUs for the IS-IS instance.
|
|
Example: Router(config-router)# authentication key-chain remote3754 |
Enables MD5 authentication for the IS-IS instance. |
|
|
-- |
|
Example: Router(config-router)# no authentication send-only |
Specifies for the IS-IS instance that MD5 authentication is performed on IS-IS PDUs being sent and received.
|
|
|
-- |
Configuring HMAC-MD5 or Clear Text Authentication for an IS-IS Interface
DETAILED STEPS
Command or Action | Purpose | |
---|---|---|
|
Example: Router> enable |
Enables privileged EXEC mode.
|
|
Example: Router# configure terminal |
Enters global configuration mode. |
|
Example: Router(config)# key chain multistate87723 |
Enables authentication for routing protocols and identifies a group of authentication keys. |
|
Example: Router(config-keychain)# key 201 |
Identifies an authentication key on a key chain.
|
|
Example: Router(config-keychain-key)# key-string idaho |
Specifies the authentication string for a key.
|
|
Example: Router(config-keychain-key)# exit |
Returns to keychain configuration mode. |
|
Example: Router(config-keychain)# exit |
Returns to global configuration mode. |
|
Example: Router(config)# interface gigabitethernet 0/0/0 |
Configures an interface. |
|
Example: Router(config-if)# isis authentication send-only |
Specifies that authentication is performed only on PDUs being sent (not received) on a specified IS-IS interface. |
|
|
Use the same key string on each router. |
|
Example: Router(config-if)# isis authentication mode md5 |
Specifies the type of authentication used for an IS-IS interface.
|
|
Example: Router(config-if)# isis authentication key-chain multistate87723 |
Enables MD5 authentication for an IS-IS interface. |
|
|
-- |
|
Example: Router(config-if)# no isis authentication send-only |
Specifies that authentication is performed on PDUs being sent and received on a specified IS-IS interface. |
|
|
-- |
Migrating to a New Authentication Type
1. Load all routers with the image required to support the new, desired authentication method.
2. Configure the new authentication mode on both the interface and the IS-IS area by following the appropriate tasks in the Configuring HMAC-MD5 Authentication or Clear Text Authentication for the First Time.
DETAILED STEPS
Step 1 | Load all routers with the image required to support the new, desired authentication method. |
Step 2 | Configure the new authentication mode on both the interface and the IS-IS area by following the appropriate tasks in the Configuring HMAC-MD5 Authentication or Clear Text Authentication for the First Time. |
Configuring Authentication on a New Router Being Added to a Network That Already Has Authentication Configured
DETAILED STEPS
Command or Action | Purpose | |
---|---|---|
|
Example: Router> enable |
Enables privileged EXEC mode.
|
|
Example: Router# configure terminal |
Enters global configuration mode. |
|
Example: Router(config)# key chain multistate87723 |
Enables authentication for routing protocols and identifies a group of authentication keys. |
|
Example: Router(config-keychain)# key 201 |
Identifies an authentication key on a key chain.
|
|
Example: Router(config-keychain-key)# key-string idaho |
Specifies the authentication string for a key.
|
|
Example: Router(config-keychain-key)# exit |
Returns to keychain configuration mode. |
|
Example: Router(config-keychain)# exit |
Returns to global configuration mode. |
|
Example: Router(config)# interface gigabitethernet 0/0/0 |
Configures an interface. |
|
Example: Router(config-if)# isis authentication mode md5 |
Specifies the type of authentication used for an IS-IS interface.
|
|
Example: Router(config-if)# isis authentication key-chain multistate87723 |
Enables MD5 authentication for an IS-IS interface. |
Configuration Examples for Enhancing Security in an IS-IS Network
- Example Configuring IS-IS HMAC-MD5 Authentication
- Example Configuring IS-IS Clear Text Authentication
Example Configuring IS-IS HMAC-MD5 Authentication
The following example configures a key chain and key for IS-IS HMAC-MD5 authentication for GigabitEthernet interface 3/0/0 (on Hello PDUs) and for the IS-IS instance (on LSP, CSNP, and PSNP PDUs).
! key chain cisco key 100 key-string tasman-drive ! interface GigabitEthernet3/0/0 ip address 10.1.1.1 255.255.255.252 ip router isis real_secure_network isis authentication mode md5 level-1 isis authentication key-chain cisco level-1 ! router isis real_secure_network net 49.0000.0101.0101.0101.00 is-type level-1 authentication mode md5 level-1 authentication key-chain cisco level-1 !
Example Configuring IS-IS Clear Text Authentication
The following example configures a key chain and key for IS-IS clear text authentication for GigabitEthernet interface 3/0/0 (on Hello PDUs) and for the IS-IS instance (on LSP, CSNP, and PSNP PDUs).
! key chain cisco key 100 key-string tasman-drive ! interface GigabitEthernet3/0/0 ip address 10.1.1.1 255.255.255.252 ip router isis real_secure_network isis authentication mode text level-1 isis authentication key-chain cisco level-1 ! router isis real_secure_network net 49.0000.0101.0101.0101.00 is-type level-1 authentication mode text level-1 authentication key-chain cisco level-1 !
Additional References
Related Documents
Related Topic |
Document Title |
---|---|
Overview of Cisco IS-IS conceptual information with links to all the individual IS-IS modules |
"Integrated IS-IS Routing Protocol Overview" module. |
Configuring a basic IS-IS network |
"Configuring a Basic IS-IS Network" module. |
Key chains and key management |
"Configuring IP Routing Protocol-Independent Features" module. |
IS-IS commands: complete command syntax, command mode, defaults, command history, usage guidelines, and examples |
Cisco IOS IP Routing: ISIS Command Reference |
Cisco IOS master command list, all releases |
Standards
Standard |
Title |
---|---|
No new or modified standards are supported by this feature, and support for existing standards has not been modified by this feature. |
-- |
MIBs
MIB |
MIBs Link |
---|---|
No new or modified MIBs are supported by this feature, and support for existing MIBs has not been modified by this feature. |
To locate and download MIBs for selected platforms, Cisco IOS XE software releases, and feature sets, use Cisco MIB Locator found at the following URL: |
RFCs
RFC |
Title |
---|---|
RFC 1321 |
The MD5 Message-Digest Algorithm |
RFC 2104 |
HMAC: Keyed-Hashing for Message Authentication |
RFC 3567 |
IS-IS Cryptographic Authentication |
Technical Assistance
Description |
Link |
---|---|
The Cisco Support and Documentation website provides online resources to download documentation, software, and tools. Use these resources to install and configure the software and to troubleshoot and resolve technical issues with Cisco products and technologies. Access to most tools on the Cisco Support and Documentation website requires a Cisco.com user ID and password. |
Feature Information for Enhancing Security in an IS-IS Network
The following table provides release information about the feature or features described in this module. This table lists only the software release that introduced support for a given feature in a given software release train. Unless noted otherwise, subsequent releases of that software release train also support that feature.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
Table 1 | Feature Information for Enhancing Security in an IS-IS Network |
Feature Name |
Releases |
Feature Information |
---|---|---|
IS-IS HMAC-MD5 Authentication and Enhanced Clear Text Authentication |
Cisco IOS XE Release 2.1 |
The IS-IS HMAC-MD5 authentication feature adds an HMAC-MD5 digest to each Intermediate System-to-Intermediate System (IS-IS) protocol data unit (PDU). The digest allows authentication at the IS-IS routing protocol level, which prevents unauthorized routing messages from being injected into the network routing domain. IS-IS clear text (plain text) authentication is enhanced so that passwords are encrypted when the software configuration is displayed and passwords are easier to manage and change. This feature was introduced on the Cisco ASR 1000 Series Aggregation Services Routers. |
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental.