12.07.2015 Views

Cisco IOS Wide-Area Networking Configuration Guide - Free Books

Cisco IOS Wide-Area Networking Configuration Guide - Free Books

Cisco IOS Wide-Area Networking Configuration Guide - Free Books

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Table 8Compatibility Matrix for L2TPv3 Authentication MethodsPE1Authentication<strong>Configuration</strong>PE2 Supporting OldAuthentication 1PE2 Supporting NewAuthentication 2PE2 Supporting Old andNew Authentication 3None None NoneNew integrity checkNoneNew integrity checkOldauthenticationOld authentication — Old authenticationOld authentication andnew authenticationOld authentication andnew integrity checkNewauthenticationNew integritycheckOld and newauthenticationOldauthenticationand new integritycheck— New authentication New authenticationOld authentication andnew authenticationNoneNoneNew integrity checkNoneNew integrity checkOld authentication New authentication Old authenticationNew authenticationOld and newauthenticationOld authentication andnew integrity checkOld authentication — Old authenticationOld authentication andnew authenticationOld authentication andnew integrity check1. Any PE software that supports only the old CHAP-like authentication system.2. Any PE software that supports only the new message digest authentication and integrity checking authentication system,but does not understand the old CHAP-like authentication system. This type of software may be implemented by othervendors based on the latest L2TPv3 draft.3. Any PE software that supports both the old CHAP-like authentication and the new message digest authentication andintegrity checking authentication system, such as <strong>Cisco</strong> <strong>IOS</strong> Release 12.0(29)S or <strong>Cisco</strong> <strong>IOS</strong> Release 12.2(27)SBC.Perform one or both of the following tasks to configure authentication parameters for the L2TPv3 controlchannel messages:• Configuring Authentication for the L2TP Control Channel, page 52 (optional)• Configuring L2TPv3 Control Message Hashing, page 53 (optional)If you choose to configure authentication using the L2TPv3 Control Message Hashing feature, you mayperform the following optional task:• Configuring L2TPv3 Digest Secret Graceful Switchover, page 55 (optional)51

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!