Configure OSPFv3
Table of Contents
10.1
Expand all | Collapse all
-
- Tap Interfaces
-
- Layer 2 and Layer 3 Packets over a Virtual Wire
- Port Speeds of Virtual Wire Interfaces
- LLDP over a Virtual Wire
- Aggregated Interfaces for a Virtual Wire
- Virtual Wire Support of High Availability
- Zone Protection for a Virtual Wire Interface
- VLAN-Tagged Traffic
- Virtual Wire Subinterfaces
- Configure Virtual Wires
- Configure an Aggregate Interface Group
- Configure Bonjour Reflector for Network Segmentation
- Use Interface Management Profiles to Restrict Access
-
- DNS Overview
- DNS Proxy Object
- DNS Server Profile
- Multi-Tenant DNS Deployments
- Configure a DNS Proxy Object
- Configure a DNS Server Profile
- Use Case 1: Firewall Requires DNS Resolution
- Use Case 2: ISP Tenant Uses DNS Proxy to Handle DNS Resolution for Security Policies, Reporting, and Services within its Virtual System
- Use Case 3: Firewall Acts as DNS Proxy Between Client and Server
- DNS Proxy Rule and FQDN Matching
-
- NAT Rule Capacities
- Dynamic IP and Port NAT Oversubscription
- Dataplane NAT Memory Statistics
-
- Translate Internal Client IP Addresses to Your Public IP Address (Source DIPP NAT)
- Enable Clients on the Internal Network to Access your Public Servers (Destination U-Turn NAT)
- Enable Bi-Directional Address Translation for Your Public-Facing Servers (Static Source NAT)
- Configure Destination NAT with DNS Rewrite
- Configure Destination NAT Using Dynamic IP Addresses
- Modify the Oversubscription Rate for DIPP NAT
- Reserve Dynamic IP NAT Addresses
- Disable NAT for a Specific Host or Interface
-
- Network Packet Broker Overview
- How Network Packet Broker Works
- Prepare to Deploy Network Packet Broker
- Configure Transparent Bridge Security Chains
- Configure Routed Layer 3 Security Chains
- Network Packet Broker HA Support
- User Interface Changes for Network Packet Broker
- Limitations of Network Packet Broker
- Troubleshoot Network Packet Broker
Configure OSPFv3
OSPF supports both IPv4 and IPv6. You must
use OSPFv3 if you
are using IPv6.
- Configure general virtual router settings.
- Configure general OSPFv3 configuration settings.
- Select theOSPFv3tab.
- SelectEnableto enable the OSPF protocol.
- Enter theRouter ID.
- SelectReject Default Routeif you do not want to learn any default routes through OSPFv3 This is the recommended default setting.ClearReject Default Routeif you want to permit redistribution of default routes through OSPFv3.
- Configure Auth Profile for the OSPFv3 protocol.While OSPFv3 doesn't include any authentication capabilities of its own, it relies entirely on IPSec to secure communications between neighbors.When configuring an authentication profile, you must use Encapsulating Security Payload (ESP) (recommended) or IPv6 Authentication Header (AH).ESP OSPFv3 authentication
- On theAuth Profilestab,Adda name for the authentication profile to authenticate OSPFv3 messages.
- Specify a Security Policy Index (SPI) (hexadecimal value in the range from 00000000 to FFFFFFFF). The two ends of the OSPFv3 adjacency must have matching SPI values.
- SelectESPforProtocol.
- Select aCrypto Algorithm.You can selectNoneor one of the following algorithms:SHA1,SHA256,SHA384,SHA512, orMD5.
- If aCrypto Algorithmother than None was selected, enter a value forKeyand then confirm.
AH OSPFv3 authentication- On theAuth Profilestab,Adda name for the authentication profile to authenticate OSPFv3 messages.
- Specify a Security Policy Index (SPI). The SPI must match between both ends of the OSPFv3 adjacency. The SPI number must be a hexadecimal value between 00000000 and FFFFFFFF.
- SelectAHforProtocol.
- Select aCrypto Algorithm.You must enter one of the following algorithms:SHA1,SHA256,SHA384,SHA512, orMD5.
- Enter a value forKeyand then confirm.
- ClickOK.
- ClickOKagain in the Virtual Router - OSPF Auth Profile dialog.
- Configure Areas - Type for the OSPFv3 protocol.
- On theAreastab,AddanArea ID. This is the identifier that each neighbor must accept to be part of the same area.
- On theGeneraltab, select one of the following from the areaTypelist:
- Normal—There are no restrictions; the area can carry all types of routes.
- Stub—There is no outlet from the area. To reach a destination outside of the area, it is necessary to go through the border, which connects to other areas. If you select this option, configure the following:
- Accept Summary—Link state advertisements (LSA) are accepted from other areas. If this option on a stub area Area Border Router (ABR) interface is disabled, the OSPF area will behave as a Totally Stubby Area (TSA) and the ABR will not propagate any summary LSAs.
- Advertise Default Route—Default route LSAs will be included in advertisements to the stub area along with a configured metric value in the configured range 1-255.
- NSSA(Not-So-Stubby Area)—The firewall can leave the area only by routes other than OSPF routes. If selected, configureAccept SummaryandAdvertise Default Routeas described forStub. If you select this option, configure the following:
- Type—Select eitherExt 1orExt 2route type to advertise the default LSA.
- Ext Ranges—Addranges of external routes that you want to enable or suppress advertising for.
- Associate an OSPFv3 authentication profile to an area or an interface.To an Area
- On theAreastab, select an existing area from the table.
- On theGeneraltab, select a previously definedAuthentication Profilefrom theAuthenticationlist.
- ClickOK.
To an Interface- On theAreastab, select an existing area from the table.
- Select theInterfacetab andAddthe authentication profile you want to associate with the OSPF interface from theAuth Profilelist.
- ClickOK.
- ClickOKagain to save the area settings.
- (Optional) Configure Export Rules.
- On theExport Rulestab, selectAllow Redistribute Default Routeto permit redistribution of default routes through OSPFv3.
- ClickAdd.
- Enter theName; the value must be a valid IPv6 subnet or valid redistribution profile name.
- SelectNew Path Type,Ext 1orExt 2.
- Specify aNew Tagfor the matched route, using has a 32-bit value in dotted-decimal notation.
- Assign aMetricto the new rule (range is 1-16,777,215).
- ClickOK.
- Configure Advanced OSPFv3 options.
- On theAdvancedtab, selectDisable Transit Routing for SPF Calculationif you want the firewall to participate in OSPF topology distribution without being used to forward transit traffic.
- Specify a value for theSPF Calculation Delay (sec)timer, which allows you to tune the delay time (in seconds) between receiving new topology information and performing an SPF calculation. Lower values enable faster OSPF re-convergence. Routers peering with the firewall should use the same delay value to optimize convergence times.
- Specify a value for theLSA Interval (sec)timer, which is the minimum time (in seconds) between transmissions of two instances of the same LSA (same router, same type, same LSA ID). This is equivalent to MinLSInterval in RFC 2328. Lower values can be used to reduce re-convergence times when topology changes occur.
- (Optional) Configure OSPF Graceful Restart.
- ClickOK.
- Commityour changes.