| Description | This article describes the steps to troubleshoot OSPF issues between FortiGate and Palo Alto devices when MD5 authentication is enabled for neighborship. |
| Scope | FortiGate. |
| Solution |
OSPF MD5 authentication needs to be enabled per interface.
Example :
config router ospf 8WUPP3o1zyF3prKfuWLyly0EJmmTONw7Qb0iHnaFiCPXtixgWnOMiNVj1qlXb22JN/lm5FSk8PJrmU 7DGQFOONZc69DY8Tvn5Kd2p2LN2osEvSTU3QD+znj6osrvI3IZFv0AycIE6woyVoBUO9UpVlmMjY3dkVA config network
The remote OSPF router connected on port2 subnet needs to configure the MD5 key as well, with ID 10 to match what FortiGate configured.
An issue happened with the Palo Alto device (connected on port3 subnet) when MD5 authentication is enabled on the AREA setting, but no MD5 key on the interface port3.
config router ospf set authentication message-digest <--- f8WUPP3o1zyF3prKfuWLyly0EJmmTONw7Qb0iHnaFiCPXtixgWnOMiNVj1qlXb22JN/ lm5FSk8PJrmU7DGQFOONZc69DY8Tvn5Kd2p2LN2osEvSTU3QD+znj6osrvI3IZFv0AycIE6woyVoBUO9UpVlmMjY3dkVA
FortiGate will send out MD5 key ID 10 in the HELLO packet on port2 as configured, but it's key ID 0 on port3.
Packet capture snippet: Port2:
Port3:
The Palo Alto device seems not able to process the HELLO packet with Key ID 0. OSPF neighborship was NOT established.
Workaround:
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.