Contents
v
Cisco IOS XR System Security Configuration Guide
MIBs SC-74
RFCs SC-74
Technical Assistance SC-74
Implementing Keychain Management on Cisco IOS XR Software SC-75
Contents SC-75
Restrictions for Implementing Keychain Management SC-75
Information About Implementing Keychain Management SC-76
Lifetime of a Key SC-76
How to Implement Keychain Management SC-76
Configuring a Keychain SC-77
Configuring a Tolerance Specification to Accept Keys SC-78
Configuring a Key Identifier for the Keychain SC-79
Configuring the Text for the Key String SC-81
Determining the Valid Keys SC-82
Configuring the Keys to Generate Authentication Digest for the Outbound Application Traffic SC-84
Configuring the Cryptographic Algorithm SC-85
Configuration Examples for Implementing Keychain Management SC-87
Configuring Keychain Management: Example SC-87
Additional References SC-88
Related Documents SC-88
Standards SC-88
MIBs SC-89
RFCs SC-89
Technical Assistance SC-89
Implementing IPSec Network Security on Cisco IOS XR Software SC-91
Contents SC-92
Prerequisites for Implementing IPSec Network Security SC-92
Restrictions for Implementing IPSec Network Security SC-93
Restrictions for Implementing IPSec Network with a
Cisco IPSec VPN SPA
SC-93
Information About Implementing IPSec Networks SC-94
Crypto Profiles SC-94
Dynamic Crypto Profiles SC-95
Crypto Access Lists SC-95
Transform Sets SC-96
Global Lifetimes for IPSec Security Associations SC-96
Manual IPSec Security Associations SC-97