
Examples
To configure the IPv6 ND proxy static route by specifying the destination prefix and the outgoing interface:
NOTE
As per the topology mentioned in the packet flow, if the IPv6 ND proxy is configured on R2, then this static route can
be configured on R1 with the destination prefix being 2002::/64. The static route can also be configured with
outgoing interface as
ve
, such as
ve 10
.
R1(config)#
R1(config)# ipv6 route 2002::/64 ethernet 1/1
R1(config)#
R1(config)# ipv6 route 2003::/64 ve 10
R1(config)# vrf green
R1(config-vrf-green)# address-family ipv6
R1(config-vrf-green-ipv6)# ipv6 route 2002::/64 eth 1/1
R1(config)#vrf green
R1(config-vrf-green)# address-family ipv6
R1(config-vrf-green-ipv6)# ipv6 route 2003::/64 ve 10
To
show
the
running-config
(with truncated output showing only the static route):
R1(config)# ipv6 route 2002::/64 ethernet 1/1
R1(config)# ipv6 route 2003::/64 ve 10
vrf green
rd 66:66
address-family ipv6
ipv6 route 2002::/64 ethernet 1/1
ipv6 route 2003::/64 ve 10
R1(config)#exit-vrf
DRBG Health Test on IPsec LP
Deterministic Random Bit Generator (DRBG) health and error checks are performed on the IPsec line card used in MLXe.
The FIPS self-test is executed at system startup, which includes DRBG health and error checks. This startup test executes a known
answer test, which includes DRBG health and error checks.
DRBG tests are performed on demand by the user by using the following CLI command:
fips crypto drbg
The expected result is the test is passed. In the event of failure, the system will restart, and perform the test again as part of FIPS self-
tests executed at system startup.
The DRBG Known Answer Test (KAT) and health test are performed during:
•
System boot-up and at regular intervals.
•
On-demand and periodic testing after 2^24 uses, during instantiate and reseed.
•
DRBG check immediately after powering on the system.
The type of DRBG mechanism and the cryptographic primitives used (e.g., AES-128 or SHA-256), are as follows:
•
Type of DRBG mechanism: Hash Based
•
Cryptographic primitives used: SHA-256
Security strengths of the cryptographic algorithms supported by the implementation: 256
DRBG Health Test on IPsec LP
Brocade NetIron MLXe Series Hardware Installation Guide
53-1004203-04
243
Summary of Contents for NetIron MLXe Series
Page 8: ...Brocade NetIron MLXe Series Hardware Installation Guide 8 53 1004203 04...
Page 12: ...Brocade NetIron MLXe Series Hardware Installation Guide 12 53 1004203 04...
Page 20: ...Brocade NetIron MLXe Series Hardware Installation Guide 20 53 1004203 04...
Page 192: ...Brocade NetIron MLXe Series Hardware Installation Guide 192 53 1004203 04...
Page 270: ...Brocade NetIron MLXe Series Hardware Installation Guide 270 53 1004203 04...
Page 286: ...Brocade NetIron MLXe Series Hardware Installation Guide 286 53 1004203 04...
Page 292: ...Brocade NetIron MLXe Series Hardware Installation Guide 292 53 1004203 04...