![Alcatel-Lucent 7950 SR Скачать руководство пользователя страница 54](http://html1.mh-extra.com/html/alcatel-lucent/7950-sr/7950-sr_system-management-manual_2892148054.webp)
Other Security Features
Page 54
7950 SR OS System Management Guide
Keychain
A keychain is a set of up to 64 keys, where each key is {A[i], K[i], V[i], S[i], T[i], S'[i], T'[i]}
as described in draft-bonica-tcp-auth-05.txt,
Authentication for TCP-based Routing and
Management Protocols
. They keys can be assigned to both sides of a BGP or LDP peer.The
individual keys in a keychain have a begin- and end-time indicating when to use this key.
These fields map to the CLI tree as:
Table 5: Keychain Mapping
Field
Definition
CLI
i
The key identifier expressed as an
integer (0...63)
config>system>security>keychain>direction>bi>entry
config>system>security>keychain>direction>uni>receive>entry
config>system>security>keychain>direction>uni>send>entry
A[i]
Authentication algorithm to use with
key[i]
config>system>security>keychain>direction>bi>entry with algorithm
algorithm
parameter.
config>system>security>keychain>direction>uni>receive>entry with
algorithm
algorithm
parameter.
config>system>security>keychain>direction>uni>send>entry with
algorithm
algorithm
parameter.
K[i]
Shared secret to use with key[i]. config>system>security>keychain>direction>uni>receive>entry with
shared secret parameter
config>system>security>keychain>direction>uni>send>entry with
shared secret parameter
config>system>security>keychain>direction>bi>entry with shared
secret parameter
V[i]
A vector that determines whether
the key[i] is to be used to generate
MACs for inbound segments, out-
bound segments, or both.
config>system>security>keychain>direction
S[i]
Start time from which key[i] can be
used by sending TCPs.
config>system>security>keychain>direction>bi>entry>begin-time
config>system>security>keychain>direction>uni>send>entry >begin-
time
T[i]
End time after which key[i] cannot
be used by sending TCPs.
Inferred by the begin-time of the next key (youngest key rule).
S'[i]
Start time from which key[i] can be
used by receiving TCPs.
config>system>security>keychain>direction>bi>entry>begin-time
config>system>security>keychain>direction>bi>entry>tolerance
config>system>security>keychain>direction>uni>receive>entry
>begin-time
config>system>security>keychain>direction>uni>receive>entry >tol-
erance
T'[i]
End time after which key[i] cannot
be used by receiving TCPs
config>system>security>keychain>direction>uni>receive>entry>end-
time
Содержание 7950 SR
Страница 10: ...Page 10 7950 SR OS System Management Guide List of Figures...
Страница 14: ...About This Guide Page 14 7950 SR OS System Management Guide...
Страница 16: ...Alcatel Lucent 7950 SR Router Configuration Process Page 16 7950 SR OS System Management Guide...
Страница 56: ...Configuration Notes Page 56 7950 SR OS System Management Guide...
Страница 88: ...Configuring Login Controls Page 88 7950 SR OS System Management Guide...
Страница 106: ...Security Command Reference Page 106 7950 SR OS System Management Guide...
Страница 206: ...Distributed CPU Protection Commands Page 206 7950 SR OS System Management Guide...
Страница 244: ...Debug Commands Page 244 7950 SR OS System Management Guide...
Страница 254: ...Configuration Notes Page 254 7950 SR OS System Management Guide...
Страница 276: ...SNMP Security Commands Page 276 7950 SR OS System Management Guide...
Страница 296: ...Show Commands Page 296 7950 SR OS System Management Guide...
Страница 322: ...Configuration Notes Page 322 7950 SR OS System Management Guide...
Страница 358: ...Log Management Tasks Page 358 7950 SR OS System Management Guide...
Страница 454: ...Facility Alarm List Page 454 7950 SR OS System Management Guide...
Страница 460: ...Standards and Protocols Page 460 Standards and Protocols...