Implementing Keychain Management onCisco IOS XR Software
How to Implement Keychain Management
SC-161
Cisco IOS XR System Security Configuration Guide for the Cisco CRS-1 Router
OL-20382-01
What to Do Next
After configuring the text for the key string, see the Configuring the Keys to Generate Authentication
Digest for the Outbound Application Traffic section.
Determining the Valid Keys
This task determines the valid keys for local applications to authenticate the remote peers.
SUMMARY STEPS
1. configure
2. key chain key-chain-name
3. key key-id
4. accept-lifetime start-time [duration duration-value | infinite | end-time]
5. end
or
commit
Step 4
key-string [clear | password] key-string-text
Example:
RP/0/RP0/CPU0:router(config-isis-keys-0x8)#
key-string password 8
Specifies the text string for the key.
• Use the clear keyword to specify the key string in clear
text form; use the password keyword to specify the key
in encrypted form.
•
Step 5
end
or
commit
Example:
RP/0/RP0/CPU0:router(config-isis-keys-0x8)# end
or
RP/0/RP0/CPU0:router(config-isis-keys-0x8)#
commit
Saves configuration changes.
• When you issue the end command, the system prompts
you to commit changes:
Uncommitted changes found, commit them before
exiting (yes/no/cancel)?
[cancel]:
–
Entering yes saves configuration changes to the
running configuration file, exits the configuration
session, and returns the router to EXEC mode.
–
Entering no exits the configuration session and
returns the router to EXEC mode without
committing the configuration changes.
–
Entering cancel leaves the router in the current
configuration session without exiting or
committing the configuration changes.
• Use the commit command to save the configuration
changes to the running configuration file and remain
within the configuration session.
Command or Action Purpose