Overview of LISP Support for TCP Authentication Option
When an ETR detects the first local EID entry, the ETR sends a UDP map-registration message to the MS. MS authenticates the UDP message using a shared authentication key configured on both the ETR and the MS. On successful authentication, the MS creates a TCP listening socket to the ETR for future message exchange.
From Cisco IOS XE Amsterdam 17.2.1, the initial UDP message sent by an ETR also indicates the AO capability.
-
If you configure TCP-AO authentication on an ETR, the ETR sets a TCP-AO flag in the UDP message. When the MS detects the TCP-AO flag set in the UDP message, the MS creates the TCP-AO-enabled connection to the ETR. TCP segments that are subsequently exchanged are authenticated using TCP-AO.
If you do not configure TCP-AO authentication on an ETR, the ETR does not set the TCP-AO flag in the UDP message. When the MS finds that the TCP-AO flag is not set in the UDP message, the MS creates a non-TCP-AO connection to the ETR. TCP messages that are subsequently exchanged are authenticated using the shared key.
-
If an ETR is not upgraded to Cisco IOS XE Amsterdam 17.2.1, the ETR sends a UDP message without the TCP-AO flag. When the MS finds no TCP-AO flag in the UDP message, the MS creates a non-TCP-AO connection to the ETR. TCP messages that are subsequently exchanged are authenticated using the shared key.
If you configure peer address locator on a TCP-AO-enabled MS using map-server
session passive-open [RLOC] , the MS creates TCP-AO
enabled listening sockets. The accept-ao-mismatch
tcb flag is set to
TRUE to maintain backward compatibility with a non-upgraded BR that is not upgraded to
Cisco IOS XE Amsterdam 17.2.1 or a later release, or does not have TCP-AO enabled.