Configuring Key Chain Management; Creating And Deleting Key Chain Entries - HP ProCurve 6200yl Series Access Security Manual

Hide thumbs Also See for ProCurve 6200yl Series:
Table of Contents

Advertisement

Configuring Key Chain Management

KMS-Related CLI Commands in This Section
show key-chain < chain_name >
[ no ] key-chain chain_name
[ no ] key-chain chain_name key Key_ID
The Key Management System (KMS) has three configuration steps:
1.
Create a key chain entry.
2. Assign a time-independent key or set of time-dependent keys to the Key
Chain entry. The choice of key type is based on the level of security
required for the protocol to which the key entry will be assigned.
3.
Assign the key chain to a KMS-enabled protocol.
This procedure is protocol-dependent. For information on a specific protocol,
refer to the chapter covering that protocol in the Management and Configu­
ration Guide for your switch.

Creating and Deleting Key Chain Entries

To use the Key Management System (KMS), you must create one or more key
chain entries. An entry can be the pointer to a single time-independent key or
a chain of time-dependent keys
.
Syntax: [ no ] key-chain < chain_name >
show key-chain
For example, to generate a new key chain entry:
Generate or delete a key chain entry. Using the
optional no form of the command deletes the key
chain. The < chain_name > parameter can include up
to 32 characters.
Displays the current key chains on the switch and their
overall status.
Key Management System
Configuring Key Chain Management
Page
page 13-3
page 13-3
page 13-4
13-3

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents