16-7
Key Management System
Configuring Key Chain Management
Figure 16-4. Display of Time-Dependent Keys in the Key Chain Entry
You can use
show key-chain
to display the key status at the time the command
is issued. Using the information from the example configuration in figures
16-3 and 16-4, if you execute
show key-chain
at 8:05 on 01/19/03, the display
would appear as follows:
Figure 16-5. Status of Keys in Key Chain Entry “Networking2”
The “Networking1” key chain entry is a time-independent key and will not
expire. “Networking2” uses time-dependent keys, which result in this data:
Keys 4 and 5 are either not yet active or expired. The total number of keys is 5.
HP Switch(config)# show key-chain Networking2
Chain - Networking2
Key | Accept Start GMT Accept Stop GMT Send Start GMT Send Stop GMT
--- + ----------------- ----------------- ----------------- -----------------
1 | 01/03/90 13:59:20 06/17/11 08:00:00 01/03/90 13:59:20 06/17/11 08:00:00
2 | 06/18/11 08:00:00 06/19/11 08:10:00 06/18/11 08:00:00 06/19/11 08:00:00
3 | 06/19/11 08:00:00 06/20/11 08:10:00 06/19/11 08:00:00 06/20/11 08:00:00
4 | 06/20/11 08:00:00 06/21/11 08:10:00 06/20/11 08:00:00 06/21/11 08:00:00
5 | 06/21/11 08:00:00 06/22/11 08:10:00 06/21/11 08:00:00 06/22/11 08:00:00
Expired = 1
Key 1 has expired because its lifetime ended at 8:10 on 01/18/03, the
previous day.
Active = 2
Key 2 and 3 are both active for 10 minutes from 8:00 to 8:10 on 1/19/03.
HP Switch(config)# show key-chain
Key Chains
Chain Name Keys Active Expired
-------------------------------- ---- ------ -------
Networking1 1 0 1
Networking2 5 1 0
Содержание HP ProCurve Series 6600
Страница 2: ......
Страница 6: ...iv ...
Страница 26: ...xxiv ...
Страница 102: ...2 48 Configuring Username and Password Security Password Recovery ...
Страница 204: ...4 72 Web and MAC Authentication Client Status ...
Страница 550: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Страница 612: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Страница 734: ...14 44 Configuring and Monitoring Port Security Operating Notes for Port Security ...
Страница 756: ...16 8 Key Management System Configuring Key Chain Management ...
Страница 776: ...20 Index web server proxy 14 42 webagent access 6 6 wildcard See ACL wildcard See ACL ...
Страница 777: ......