Implementing Keychain Management on Cisco IOS XR Software
How to Implement Keychain Management
SC-80
Cisco IOS XR System Security Configuration Guide
SUMMARY STEPS
1. configure
2. key chain key-chain-name
3. key key-id
4. end
or
commit
DETAILED STEPS
Command or Action Purpose
Step 1
configure
Example:
RP/0/RP0/CPU0:router# configure
Enters global configuration mode.
Step 2
key chain
key-chain-name
Example:
RP/0/RP0/CPU0:router(config)# key chain
isis-keys
Creates a name for the keychain.
Step 3
key
key-id
Example:
RP/0/RP0/CPU0:router(config-isis-keys)# key 8
Creates a key for the keychain. The key ID number is
translated from decimal to hexadecimal to create the
command mode subprompt.
• Use the key-id argument as a 48-bit integer.
Step 4
end
or
commit
Example:
RP/0/RP0/CPU0:router(config-isis-keys-0x8)# end
or
RP/0/RP0/CPU0:router(config-isis-keys-0x8)#
commit
Saves configuration changes.
• When you issue the end command, the system prompts
you to commit changes:
Uncommitted changes found, commit them before
exiting(yes/no/cancel)?
[cancel]:
–
Entering yes saves configuration changes to the
running configuration file, exits the configuration
session, and returns the router to EXEC mode.
–
Entering no exits the configuration session and
returns the router to EXEC mode without
committing the configuration changes.
–
Entering cancel leaves the router in the current
configuration session without exiting or
committing the configuration changes.
• Use the commit command to save the configuration
changes to the running configuration file and remain
within the configuration session.