Implementing Internet Key Exchange Security Protocol on Cisco IOS XR Software
How to Implement IKE Security Protocol Configurations for IPSec Networks
SC-123
Cisco IOS XR System Security Configuration Guide for the Cisco CRS-1 Router
OL-20382-01
Configuring RSA Public Keys of All the Other Peers
This task configures the RSA public keys of all the other peers.
Remember to repeat these tasks at each peer that uses RSA encrypted nonces in an IKE policy.
SUMMARY STEPS
1. configure
2. crypto keyring keyring-name [vrf fvrf-name]
3. rsa-pubkey {address address | name fqdn} [encryption | signature]
4. address ip-address
5. key-string key-string
6. quit
7. end
or
commit
8. show crypto key pubkey-chain rsa [name key-name | address key-address]
Step 3
host hostname address1 [address2...address8]
Example:
RP/0/RP0/CPU0:router(config)# host host1
10.0.0.5
(At all remote peers) Maps the peer’s hostname to its IP
addresses at all the remote peers.
• This command is used if the local peer’s ISAKMP
identity was specified using a hostname.
• This step might be unnecessary if the hostname or
address is already mapped in a DNS server.
Step 4
end
or
commit
Example:
RP/0/RP0/CPU0:router(config)# end
or
RP/0/RP0/CPU0:router(config)# commit
Saves configuration changes.
• When you issue the end command, the system prompts
you to commit changes:
Uncommitted changes found, commit them before
exiting (yes/no/cancel)?
[cancel]:
–
Entering yes saves configuration changes to the
running configuration file, exits the configuration
session, and returns the router to EXEC mode.
–
Entering no exits the configuration session and
returns the router to EXEC mode without
committing the configuration changes.
–
Entering cancel leaves the router in the current
configuration session without exiting or
committing the configuration changes.
• Use the commit command to save the configuration
changes to the running configuration file and remain
within the configuration session.
Command or Action Purpose