Implementing Internet Key Exchange Security Protocol on Cisco IOS XR Software
How to Implement IKE Security Protocol Configurations for IPSec Networks
SC-48
Cisco IOS XR System Security Configuration Guide
Configuring ISAKMP Preshared Keys in ISAKMP Keyrings
This task configures ISAKMP preshared keys in ISAKMP keyrings.
Prerequisites
To configure ISAKMP preshared keys in ISAKMP keyrings, perform these tasks at each peer that uses
preshared keys in an IKE policy:
• Set the ISAKMP identity of each peer. Each peer’s identity should be set either to its hostname or
by its IP address. By default, a peer’s identity is set to its IP address. Setting ISAKMP identities is
described in the “Configuring ISAKMP Identity” section on page 44.
• Specify the shared keys at each peer. Note that a given preshared key is shared between two peers.
At a given peer you could specify the same key to share with multiple remote peers; however, a more
secure approach is to specify different keys to share between different pairs of peers.
You must specify the support for masked preshared keys.
Remember to repeat these tasks at each peer that uses preshared keys in an IKE policy.
Step 7
end
or
commit
Example:
RP/0/RP0/CPU0:router(config)# end
or
RP/0/RP0/CPU0:router(config)# commit
Saves configuration changes.
• When you issue the end command, the system prompts
you to commit changes:
Uncommitted changes found, commit them before
exiting(yes/no/cancel)?
[cancel]:
–
Entering yes saves configuration changes to the
running configuration file, exits the configuration
session, and returns the router to EXEC mode.
–
Entering no exits the configuration session and
returns the router to EXEC mode without
committing the configuration changes.
–
Entering cancel leaves the router in the current
configuration session without exiting or
committing the configuration changes.
• Use the commit command to save the configuration
changes to the running configuration file and remain
within the configuration session.
Step 8
show crypto pubkey-chain rsa [name
key-name
|
address
key-address
]
Example:
RP/0/RP0/CPU0:router# show crypto pubkey-chain
rsa
(Optional) Displays a list of all the RSA public keys stored
on your router.
• Use the optional name or address keyword to display
details about a particular RSA public key stored on
your router.
Command or Action Purpose