Implementing Internet Key Exchange Security Protocol on Cisco IOS XR Software
SUMMARY STEPS
1.
2.
3.
4.
DETAILED STEPS
Command or Action
Step 1
configure
Example:
RP/0/RP0/CPU0:router# configure
Step 2
crypto keyring keyring-name [vrf fvrf-name ]
Example:
RP/0/RP0/CPU0:router(config)# crypto keyring
vpnkeyring
RP/0/RP0/CPU0:router(config-keyring)#
configure
crypto keyring keyring-name [vrf fvrf-name]
pre-shared-key {address address [mask] | hostname hostname} key key
end
or
commit
How to Implement IKE Security Protocol Configurations for IPSec Networks
Purpose
Enters global configuration mode.
Defines a crypto keyring during IKE authentication.
Use the keyring-name argument to specify the name of
•
the crypto keyring.
(Optional) Use the vrf keyword to specify that the front
•
door virtual routing and forwarding (FVRF) name is the
keyring that is referenced.
Cisco IOS XR System Security Configuration Guide
SC-49