16-4
Key Management System
Configuring Key Chain Management
Assigning a Time-Independent Key to a Chain
A time-independent key has no Accept or Send time constraints. It is valid
from boot-up until you change it. If you use a time-independent key, then it is
the only key needed for a key chain entry.
For example, to generate a new time-independent key for the Networking1
key chain entry:
Figure 16-2. Example of Adding and Displaying a Time-Independent Key to a Key Chain Entry
Syntax:
[no] key-chain
< chain_name >
key
< key_id >
Generates or deletes a key in the key chain entry
< chain_name >
. Using the optional
no
form of the
command deletes the key. The
< key_id >
is any
number from 0-255.
[ key-string
< key_str >
]
This option lets you specify the key value for the
protocol using the key. The
< key_str >
can be any
string of up to 14 characters in length.
[ accept-lifetime infinite ] [ send-lifetime infinite ]
accept-lifetime infinite:
Allows packets with this key to
be accepted at any time from boot-up until the key
is removed.
send-lifetime infinite:
A
llows the switch to send this
key as authorization, from boot-up until the key is
removed.
show key-chain
< chain_name >
Displays the detail information about the keys used
in the key chain named
< chain_name >.
HP Switch(config)# key-chain Networking1 key 1
HP Switch(config)# show key-chain Networking1
Chain - Networking1
Key | Accept Start GMT Accept Stop GMT Send Start GMT Send Stop GMT
--- + ----------------- ----------------- ----------------- -------------
1 | Bootup Infinite Bootup Infinite
Adds a new Time-Independent
key to the “Networking1” chain.
Displays keys in the key chain
entry.
Summary of Contents for HP ProCurve Series 6600
Page 2: ......
Page 6: ...iv ...
Page 26: ...xxiv ...
Page 102: ...2 48 Configuring Username and Password Security Password Recovery ...
Page 204: ...4 72 Web and MAC Authentication Client Status ...
Page 550: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Page 612: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Page 734: ...14 44 Configuring and Monitoring Port Security Operating Notes for Port Security ...
Page 756: ...16 8 Key Management System Configuring Key Chain Management ...
Page 776: ...20 Index web server proxy 14 42 webagent access 6 6 wildcard See ACL wildcard See ACL ...
Page 777: ......