Implementing Keychain Management onCisco IOS XR Software
Configuration Examples for Implementing Keychain
Management
This section provides the following configuration example:
•
Configuring Keychain Management: Example
The following example shows how to configure keychain management:
configure
key chain isis-keys
accept-tolerance infinite
key 8
key-string mykey91abcd
cryptographic-algorithm MD5
send-lifetime 1:00:00 june 29 2006 infinite
accept-lifetime 1:00:00 june 29 2006 infinite
end
Uncommitted changes found, commit them? [yes]: yes
show key chain isis-keys
Key-chain: isis-keys/ -
accept-tolerance -- infinite
Key 8 -- text "1104000E120B520005282820"
cryptographic-algorithm -- MD5
Send lifetime:
Accept lifetime: 01:00:00, 29 Jun 2006 - Always valid [Valid now]
Additional References
The following sections provide references related to implementing keychain management.
Related Documents
Related Topic
Keychain management commands: complete
command syntax, command modes, command
history, defaults, usage guidelines, and examples
OL-20382-01
Configuring Keychain Management: Example, page SC-167
01:00:00, 29 Jun 2006 - Always valid
Document Title
Keychain Management Commands on Cisco IOS XR Software module in
Cisco IOS XR System Security Command Reference
Cisco IOS XR System Security Configuration Guide for the Cisco CRS-1 Router
Configuration Examples for Implementing Keychain Management
[Valid now]
SC-167