EasyManua.ls Logo

Nokia 7705 - Page 409

Nokia 7705
538 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Basic System Configuration Guide System Management
Edition: 01 3HE 11010 AAAC TQZZA 409
peer
Syntax [no] peer ip-address [create]
Context config>redundancy>multi-chassis
Description This command configures a multi-chassis redundancy peer.
Parameters ip-address — specifies a peer IP address. A multicast address is not allowed.
create — keyword required when first creating the configuration context. When the
context is created, you can navigate into the context without the create keyword.
authentication-key
Syntax authentication-key [authentication-key | hash-key] [hash | hash2]
no authentication-key
Context config>redundancy>multi-chassis>peer
Description This command configures the authentication key used between this node and the multi-
chassis peer. The authentication key can be any combination of letters or numbers.
Parameters authentication-keyspecifies the authentication key. Allowed values are any string up
to 20 characters long composed of printable, 7-bit ASCII characters. If the string
contains special characters (#, $, spaces, etc.), the entire string must be enclosed
within double quotes.
hash-keyspecifies the hash key. The key can be any combination of ASCII characters
up to 33 (hash1-key) or 55 (hash2-key) characters in length (encrypted). If spaces
are used in the string, the entire string must be enclosed within double quotes.
hash — specifies that the key is entered in an encrypted form. If the hash or hash2
parameter is not used, the key is assumed to be in a non-encrypted, clear text form.
For security, all keys are stored in encrypted form in the configuration file with the
hash or hash2 parameter specified.
hash2 — specifies that the key is entered in a more complex encrypted form that
involves more variables than the key value alone. This means that a hash2 encrypted
variable cannot be copied and pasted. If the hash or hash2 parameter is not used,
the key is assumed to be in a non-encrypted, clear text form. For security, all keys
are stored in encrypted form in the configuration file with the hash or hash2
parameter specified.

Table of Contents

Other manuals for Nokia 7705

Related product manuals