Alcatel-Lucent 7450 Basic System Configuration Manual page 435

Ethernet service switch /service router /extensible routing system
Hide thumbs Also See for 7450:
Table of Contents

Advertisement

config — Synchronize only the primary, secondary, and tertiary configuration files.
Peer Commands
peer
Syntax
[no] peer ip-address
Context
config>redundancy>multi-chassis
Description
This command configures a multi-chassis redundancy peer.
Parameters
ip-address — Specifies a peer IP address. Multicast address are not allowed.
authentication-key
Syntax
authentication-key [authentication-key | hash-key] [hash | hash2]
no authentication-key
Context
config>redundancy>multi-chassis>peer
Description
This command configures the authentication key used between this node and the multi-chassis peer.
The authentication key can be any combination of letters or numbers.
Parameters
authentication-key — Specifies the authentication key. Allowed values are any string up to 20
hash-key — The hash key. The key can be any combination of ASCII characters up to 33 (hash1-
hash — Specifies the key is entered in an encrypted form. If the hash or hash2 parameter is not
hash2 — Specifies the key is entered in a more complex encrypted form that involves more
Basic System Configuration Guide
Default
config
characters long composed of printable, 7-bit ASCII characters. If the string contains special
characters (#, $, spaces, etc.), the entire string must be enclosed within double quotes.
key) or 55 (hash2-key) characters in length (encrypted). If spaces are used in the string,
enclose the entire string in quotation marks (" ").
used, the key is assumed to be in an unencrypted, clear text form. For security, all keys are
stored in encrypted form in the configuration file with the hash or hash2 parameter specified
variables than the key value alone, meaning that the hash2 encrypted variable cannot be
copied and pasted. If the hash or hash2 parameter is not used, the key is assumed to be in an
unencrypted, clear text form. For security, all keys are stored in encrypted form in the
configuration file with the hash or hash2 parameter specified.
System Management
435

Advertisement

Table of Contents
loading

This manual is also suitable for:

77507950

Table of Contents