Implementing Internet Key Exchange Security Protocol on Cisco IOS XR Software
How to Implement IKE Security Protocol Configurations for IPSec Networks
SC-49
Cisco IOS XR System Security Configuration Guide
SUMMARY STEPS
1. configure
2. crypto keyring keyring-name [vrf fvrf-name]
3. pre-shared-key {address address [mask] | hostname hostname} key key
4. end
or
commit
DETAILED STEPS
Command or Action Purpose
Step 1
configure
Example:
RP/0/RP0/CPU0:router# configure
Enters global configuration mode.
Step 2
crypto keyring
keyring-name
[vrf
fvrf-name
]
Example:
RP/0/RP0/CPU0:router(config)# crypto keyring
vpnkeyring
RP/0/RP0/CPU0:router(config-keyring)#
Defines a crypto keyring during IKE authentication.
• Use the keyring-name argument to specify the name of
the crypto keyring.
• (Optional) Use the vrf keyword to specify that the front
door virtual routing and forwarding (FVRF) name is the
keyring that is referenced.