
IP Routing Protocol-Independent Commands
185
Example
The following example identifies an authentication keygroup called "M".
key (key chain)
The
key
key chain configuration command defines an authentication key on a key chain. To remove
the key from the key chain, use the
no
form of this command.
Syntax
key
key-id
no key
key-id
•
key-id
—An authentication key identification number on a key chain. (Range: 1 - 255)
Default Configuration
No key exists on the key chain.
Command Mode
Key chain configuration mode
User Guidelines
It is useful to have multiple keys on a key chain so that the software can sequence through the
keys as they become invalid after time, based on the
accept-lifetime
and
send-lifetime
key
chain key command settings.
Authentication keys and their key strings, which are to be included in the key chain should be
defined prior to configuring the key chain. Authentication keys are defined by the
key
(global) command
If the last key expires, authentication stops and an error message is generated.
Example
The following example identifies two authentication keys, number 1 and 2, on a key chain keygroup
called "M".
Console (config)#
key-chain
M
Console (config)#
key-chain
M
Console (config-keychain)#
key
1
Console (config-keychain)#
key
2
Summary of Contents for PowerConnect 6024
Page 24: ...24 Contents ...
Page 86: ...86 ACL Commands w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 128: ...128 Configuration and Image Files w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 182: ...182 IGMP Snooping Commands w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 206: ...206 Line Commands w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 280: ...280 Port Channel Commands w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 284: ...284 Port Monitor Commands w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 316: ...316 QoS Commands w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 368: ...368 w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 410: ...410 SSH Commands w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 443: ...TACACS Commands 443 Global values TimeOut 3 Source IP 172 16 8 1 OOB Source IP 172 16 8 1 ...
Page 444: ...444 TACACS Commands w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 452: ...452 User Interface w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 476: ...476 VRRP Commands w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 486: ...486 Web Server w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 504: ...504 802 1x Commands w w w d e l l c o m s u p p o r t d e l l c o m ...