How to Implement Keychain Management
Configuring the Keys to Generate Authentication Digest for the Outbound
Application Traffic
This task configures the keys to generate authentication digest for the outbound application traffic.
SUMMARY STEPS
1.
2.
3.
4.
5.
DETAILED STEPS
Command or Action
Step 1
configure
Example:
RP/0/RP0/CPU0:router# configure
Step 2
key chain key-chain-name
Example:
RP/0/RP0/CPU0:router(config)# key chain
isis-keys
Step 3
key key-id
Example:
RP/0/RP0/CPU0:router(config-isis-keys)# key 8
RP/0/RP0/CPU0:router(config-isis-keys-0x8)#
Cisco IOS XR System Security Configuration Guide
SC-84
configure
key chain key-chain-name
key key-id
send-lifetime start-time [duration durationvalue | infinite | end-time]
end
or
commit
Implementing Keychain Management on Cisco IOS XR Software
Purpose
Enters global configuration mode.
Creates a name for the keychain.
Creates a key for the keychain.