Dell POWEREDGE M1000E User Manual

Page 998

Advertising
background image

38-106

Cisco Catalyst Blade Switch 3130 and 3032 for Dell Software Configuration Guide

OL-13270-03

Chapter 38 Configuring IP Unicast Routing

Configuring Protocol-Independent Features

You can configure multiple keys with life times. Only one authentication packet is sent, regardless of
how many valid keys exist. The software examines the key numbers in order from lowest to highest and
uses the first valid key it encounters. The lifetimes allow for overlap during key changes. Note that the
router must know these lifetimes.

Beginning in privileged EXEC mode, follow these steps to manage authentication keys:

To remove the key chain, use the no key chain name-of-chain global configuration command.

Command

Purpose

Step 1

configure terminal

Enter global configuration mode.

Step 2

key chain name-of-chain

Identify a key chain, and enter key chain configuration
mode.

Step 3

key number

Identify the key number. The range is 0 to 2147483647.

Step 4

key-string text

Identify the key string. The string can contain from 1 to
80 uppercase and lowercase alphanumeric characters,
but the first character cannot be a number.

Step 5

accept-lifetime start-time {infinite | end-time | duration
seconds}

(Optional) Specify the time period during which the key
can be received.

The start-time and end-time syntax can be either
hh:mm:ss Month date year or hh:mm:ss date Month
year
. The default is forever with the default start-time
and the earliest acceptable date as January 1, 1993. The
default end-time and duration is infinite.

Step 6

send-lifetime start-time {infinite | end-time | duration
seconds}

(Optional) Specify the time period during which the key
can be sent.

The start-time and end-time syntax can be either
hh:mm:ss Month date year or hh:mm:ss date Month
year
. The default is forever with the default start-time
and the earliest acceptable date as January 1, 1993. The
default end-time and duration is infinite.

Step 7

end

Return to privileged EXEC mode.

Step 8

show key chain

Display authentication key information.

Step 9

copy running-config startup-config

(Optional) Save your entries in the configuration file.

Advertising