Key Management System
Configuring Key Chain Management
Add new key chain
Entry “Procurve1”.
Display key chain
entries.
Figure 13-1. Adding a New Key Chain Entry
After you add an entry, you can assign key(s) to it for use by a KMS-enabled
protocol.
Assigning a Time-Independent Key to a Chain
A time-independent key has no Accept or Send time constraints. It is valid
from boot-up until you change it. If you use a time-independent key, then it is
the only key needed for a key chain entry.
Syntax:
[no] key-chain
< chain_name >
key
< key_id >
Generates or deletes a key in the key chain entry
< chain_name >
. Using the optional
no
form of the
command deletes the key. The
< key_id >
is any
number from 0-255.
[ key-string
< key_str >
]
This option lets you specify the key value for the
protocol using the key. The
< key_str >
can be any
string of up to 14 characters in length.
[ accept-lifetime infinite ] [ send-lifetime infinite ]
accept-lifetime infinite:
Allows packets with this key to
be accepted at any time from boot-up until the key
is removed.
send-lifetime infinite:
A
llows the switch to send this
key as authorization, from boot-up until the key is
removed.
show key-chain
< chain_name >
Displays the detail information about the keys used
in the key chain named
< chain_name >.
For example, to generate a new time-independent key for the Procurve1 key
chain entry:
13-4
Summary of Contents for J8697A
Page 1: ...6200yl Access Security Guide 5400zl 3500yl ProCurve Switches K 11 XX www procurve com ...
Page 2: ......
Page 22: ...Product Documentation Feature Index xx ...
Page 55: ...Configuring Username and Password Security Front Panel Security 2 21 ...
Page 56: ...Configuring Username and Password Security Front Panel Security 2 22 ...
Page 58: ...Virus Throttling Contents Operating Notes 3 30 Connection Rate Log and Trap Messages 3 31 3 2 ...
Page 88: ...Virus Throttling Connection Rate Log and Trap Messages This page is intentionally unused 3 32 ...
Page 118: ...Web and MAC Authentication Client Status This page intentionally unused 4 30 ...
Page 356: ...Configuring and Monitoring Port Security Operating Notes for Port Security 11 44 ...
Page 370: ...Using Authorized IP Managers Operating Notes This page is intentionally unused 12 14 ...
Page 388: ...10 Index ...
Page 389: ......