16-4
Key Management System
Configuring Key Chain Management
For example, to generate a new time-independent key for the HP Switch1 key
chain entry:
Figure 16-2. Example of Adding and Displaying a Time-Independent Key to a Key Chain Entry
This option lets you specify the key value for the
protocol using the key. The
< key_str >
can be any
string of up to 14 characters in length.
[ accept-lifetime infinite ] [ send-lifetime infinite ]
accept-lifetime infinite:
Allows packets with this key to
be accepted at any time from boot-up until the key
is removed.
send-lifetime infinite:
A
llows the switch to send this
key as authorization, from boot-up until the key is
removed.
show key-chain
< chain_name >
Displays the detail information about the keys used
in the key chain named
< chain_name >.
HP Switch(config)# key-chain HP Switch1 key1
HP Switch(config)# show key-chain HP Switch1
Chain - HP Switch1
|
Key | Accept Start GMT Accept Stop GMT Send Start GMT Send Stop GMT
---- + ----------------- --------------- -------------- -------------
1 | Bootup Infinite Bootup Infinite
OSPF interface References
Interface
---------------------
OSPF Virtual Link References
Area/Virtual Link
------------------------------
Adds a new Time-Independent
key to the “HP Switch1” chain.
Displays keys in the key chain
entry.
Summary of Contents for E3800 Series
Page 2: ......
Page 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Page 30: ...xxviii ...
Page 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Page 186: ...4 72 Web and MAC Authentication Client Status ...
Page 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Page 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Page 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Page 730: ...20 Index ...
Page 731: ......