Key Management System
Configuring Key Chain Management
Configuring Key Chain Management
KMS-Related CLI Commands in This Section
Page
show key-chain <
chain_name
>
[ no ] key-chain
chain_name
[ no ] key-chain
chain_name
key
Key_ID
The Key Management System (KMS) has three configuration steps:
1. Create a key chain entry.
2. Assign a time-independent key or set of time-dependent keys to the Key
Chain entry. The choice of key type is based on the level of security
required for the protocol to which the key entry will be assigned.
3. Assign the key chain to a KMS-enabled protocol.
This procedure is protocol-dependent. For information on a specific protocol,
refer to the chapter covering that protocol in the
Management and Configu
ration Guide
for your switch.
Creating and Deleting Key Chain Entries
To use the Key Management System (KMS), you must create one or more key
chain entries. An entry can be the pointer to a single time-independent key or
a chain of time-dependent keys
.
Syntax:
[ no ] key-chain
< chain_name >
Generate or delete a key chain entry. Using the
optional
no
form of the command deletes the key
chain. The
< chain_name >
parameter can include up
to 32 characters.
show key-chain
Displays the current key chains on the switch and their
overall status.
For example, to generate a new key chain entry:
13-3
Summary of Contents for J8697A
Page 1: ...6200yl Access Security Guide 5400zl 3500yl ProCurve Switches K 11 XX www procurve com ...
Page 2: ......
Page 22: ...Product Documentation Feature Index xx ...
Page 55: ...Configuring Username and Password Security Front Panel Security 2 21 ...
Page 56: ...Configuring Username and Password Security Front Panel Security 2 22 ...
Page 58: ...Virus Throttling Contents Operating Notes 3 30 Connection Rate Log and Trap Messages 3 31 3 2 ...
Page 88: ...Virus Throttling Connection Rate Log and Trap Messages This page is intentionally unused 3 32 ...
Page 118: ...Web and MAC Authentication Client Status This page intentionally unused 4 30 ...
Page 356: ...Configuring and Monitoring Port Security Operating Notes for Port Security 11 44 ...
Page 370: ...Using Authorized IP Managers Operating Notes This page is intentionally unused 12 14 ...
Page 388: ...10 Index ...
Page 389: ......