Implementing Keychain Management on Cisco IOS XR Software
Configuration Examples for Implementing Keychain Management
SC-87
Cisco IOS XR System Security Configuration Guide
Configuration Examples for Implementing Keychain
Management
This section provides the following configuration example:
• Configuring Keychain Management: Example, page SC-87
Configuring Keychain Management: Example
The following example shows how to configure keychain management:
configure
key chain isis-keys
Step 4
cryptographic-algorithm [HMAC-MD5 | HMAC-SHA1-12 |
HMAC-SHA1-20 | MD5 | SHA-1]
Example:
RP/0/RP0/CPU0:router(config-isis-keys-0x8)#
cryptographic-algorithm MD5
Specifies the choice of the cryptographic algorithm.
You can choose from the following list of
algorithms:
• HMAC-MD5
• HMAC-SHA1-12
• HMAC-SHA1-20
• MD5
• SHA-1
Step 5
end
or
commit
Example:
RP/0/RP0/CPU0:router(config-isis-keys-0x8)# end
or
RP/0/RP0/CPU0:router(config-isis-keys-0x8)# commit
Saves configuration changes.
• When you issue the end command, the system
prompts you to commit changes:
Uncommitted changes found, commit them
before exiting(yes/no/cancel)?
[cancel]:
–
Entering yes saves configuration changes to
the running configuration file, exits the
configuration session, and returns the
router to EXEC mode.
–
Entering no exits the configuration session
and returns the router to EXEC mode
without committing the configuration
changes.
–
Entering cancel leaves the router in the
current configuration session without
exiting or committing the configuration
changes.
• Use the commit command to save the
configuration changes to the running
configuration file and remain within the
configuration session.
Command or Action Purpose