Prerequisites for Keychain Management 420
Guidelines and Limitations for Keychain Management 420
Default Settings for Keychain Management 421
Configuring Keychain Management 421
Creating a Keychain 421
Removing a Keychain 422
Configuring a Master Key and Enabling the AES Password Encryption Feature 423
Configuring Text for a Key 424
Configuring Accept and Send Lifetimes for a Key 425
Configuring a Key for OSPFv2 Cryptographic Authentication 427
Determining Active Key Lifetimes 428
Verifying the Keychain Management Configuration 428
Configuration Example for Keychain Management 429
Where to Go Next 429
Additional References for Keychain Management 429
Configuring Traffic Storm Control 431
CHAPTER 20
About Traffic Storm Control 431
Licensing Requirements for Traffic Storm Control 432
Guidelines and Limitations for Traffic Storm Control 433
Default Settings for Traffic Storm Control 434
Configuring Traffic Storm Control 434
Verifying Traffic Storm Control Configuration 436
Monitoring Traffic Storm Control Counters 436
Configuration Examples for Traffic Storm Control 436
Additional References for Traffic Storm Control 437
Configuring Unicast RPF 439
CHAPTER 21
About Unicast RPF 439
Unicast RPF Process 440
Licensing Requirements for Unicast RPF 441
Guidelines and Limitations for Unicast RPF 441
Default Settings for Unicast RPF 442
Configuring Unicast RPF for Cisco Nexus 9500 Switches with -R Line Cards 443
Cisco Nexus 9000 Series NX-OS Security Configuration Guide, Release 9.x
xx
Contents