How to Implement Keychain Management
Command or Action
Step 4
cryptographic-algorithm [HMAC-MD5 | HMAC-SHA1-12 |
HMAC-SHA1-20 | MD5 | SHA-1]
Example:
RP/0/RP0/CPU0:router(config-isis-keys-0x8)#
cryptographic-algorithm MD5
Step 5
end
or
commit
Example:
RP/0/RP0/CPU0:router(config-isis-keys-0x8)# end
or
RP/0/RP0/CPU0:router(config-isis-keys-0x8)# commit
Cisco IOS XR System Security Configuration Guide for the Cisco CRS-1 Router
SC-166
Implementing Keychain Management onCisco IOS XR Software
Purpose
Specifies the choice of the cryptographic algorithm.
You can choose from the following list of
algorithms:
HMAC-MD5
•
HMAC-SHA1-12
•
•
HMAC-SHA1-20
•
MD5
•
SHA-1
The routing protocols each support a different set of
cryptographic algorithms:
•
Border Gateway Protocol (BGP) supports only
HMAC-MD5 and HMAC-SHA1-12.
Intermediate System-to-Intermediate System
•
(IS-IS) supports only HMAC-MD5.
Open Shortest Path First (OSPF) supports only
•
MD5 and HMAC-MD5.
Saves configuration changes.
When you issue the end command, the system
•
prompts you to commit changes:
Uncommitted changes found, commit them
before exiting (yes/no/cancel)?
[cancel]:
Entering yes saves configuration changes to
–
the running configuration file, exits the
configuration session, and returns the
router to EXEC mode.
Entering no exits the configuration session
–
and returns the router to EXEC mode
without committing the configuration
changes.
–
Entering cancel leaves the router in the
current configuration session without
exiting or committing the configuration
changes.
Use the commit command to save the
•
configuration changes to the running
configuration file and remain within the
configuration session.
OL-20382-01