Implementing Keychain Management onCisco IOS XR Software
How to Implement Keychain Management
SC-155
Cisco IOS XR System Security Configuration Guide for the Cisco CRS-1 Router
OL-20382-01
Multiple keychains can be specified.
How to Implement Keychain Management
This section contains the following procedures:
• Configuring a Keychain, page SC-155 (required)
• Configuring a Tolerance Specification to Accept Keys, page SC-157 (required)
• Configuring a Key Identifier for the Keychain, page SC-158 (required)
• Configuring the Text for the Key String, page SC-159 (required)
• Determining the Valid Keys, page SC-161 (optional)
• Configuring the Keys to Generate Authentication Digest for the Outbound Application Traffic,
page SC-163 (required)
• Configuring the Cryptographic Algorithm, page SC-164 (required)
Configuring a Keychain
This task configures a name for the keychain.
You can create or modify the name of the keychain.
SUMMARY STEPS
1. configure
2. key chain key-chain-name
3. end
or
commit
4. show key chain key-chain-name