Disabling or re-enabling event logging, Ipsec for ospf v3 – Brocade Communications Systems Layer 3 Routing Configuration ICX 6650 User Manual
Page 265

Brocade ICX 6650 Layer 3 Routing Configuration Guide
247
53-1002603-01
OSPF V3 configuration
•
Transmit-delay: The time it takes to transmit Link State Update packets on this interface. The
command syntax is ipv6 ospf transmit-delay seconds. The value can be from 0–3600 seconds.
The default is 1 second.
Disabling or re-enabling event logging
OSPF V3 does not currently support the generation of SNMP traps. Instead, you can disable or
re-enable the logging of OSPF V3-related events such as neighbor state changes and database
overflow conditions. By default, the Brocade device logs these events. Since the OSPFv3 logs are
enabled by defaut, the following log messages appear once the system is up.
May 8 10:06:09:N:OSPFv3 originate LSA, rid 10.16.16.16, area 0.0.0.16, LSA type
IntraPrefix, LSA id 0.0.0.10, LSA router id 10.16.16.16
May 8 10:06:09:N:OSPFv3 originate LSA, rid 10.16.16.16, area 0.0.0.16, LSA type
Network, LSA id 0.0.0.2, LSA router id 10.16.16.16
May 8 10:06:08:N:OSPFv3 originate LSA, rid 10.16.16.16, area 0.0.0.16, LSA type
Router, LSA id 0.0.0.0, LSA router id 10.16.16.16
To disable the logging of events, enter the following command.
Brocade(config-ospf6-router)#no log-status-change
Syntax: [no] log-status-change
To re-enable the logging of events, enter the following command.
Brocade(config-ospf6-router)#log-status-change
IPsec for OSPF V3
This section describes the implementation of Internet Protocol Security (IPsec) for securing OSPFv3
traffic. For background information and configuration steps, refer to
IPsec is available for OSPFv3 traffic only and only for packets that are “for-us.” A for-us packet is
addressed to one of the IPv6 addresses on the device or to an IPv6 multicast address. Packets
that are just forwarded by the line card do not receive IPsec scrutiny.
Brocade devices support the following components of IPsec for IPv6-addressed packets:
•
Authentication through Encapsulating Security Payload (ESP) in transport mode
•
HMAC-SHA1-96 as the authentication algorithm
•
Manual configuration of keys
•
Configurable rollover timer
IPsec can be enabled on the following logical entities:
•
Interface
•
Area
•
Virtual link
With respect to traffic classes, this implementation of IPsec uses a single security association (SA)
between the source and destination to support all traffic classes and so does not differentiate
between the different classes of traffic that the DSCP bits define.