Key Management System
Configuring Key Chain Management
Configuring Key Chain Management
KMS-Related CLI Commands in This Section
Page
show key-chain <
chain_name
>
[ no ] key-chain
chain_name
[ no ] key-chain
chain_name
key
Key_ID
The Key Management System (KMS) has three configuration steps:
1. Create a key chain entry.
2. Assign a time-independent key or set of time-dependent keys to the Key
Chain entry. The choice of key type is based on the level of security
required for the protocol to which the key entry will be assigned.
3. Assign the key chain to a KMS-enabled protocol.
This procedure is protocol-dependent. For information on a specific protocol,
refer to the chapter covering that protocol in the
Management and Configu
ration Guide
for your switch.
Creating and Deleting Key Chain Entries
To use the Key Management System (KMS), you must create one or more key
chain entries. An entry can be the pointer to a single time-independent key or
a chain of time-dependent keys
.
Syntax:
[ no ] key-chain
< chain_name >
Generate or delete a key chain entry. Using the
optional
no
form of the command deletes the key
chain. The
< chain_name >
parameter can include up
to 32 characters.
show key-chain
Displays the current key chains on the switch and their
overall status.
For example, to generate a new key chain entry:
13-3
Содержание J8697A
Страница 1: ...6200yl Access Security Guide 5400zl 3500yl ProCurve Switches K 11 XX www procurve com ...
Страница 2: ......
Страница 22: ...Product Documentation Feature Index xx ...
Страница 55: ...Configuring Username and Password Security Front Panel Security 2 21 ...
Страница 56: ...Configuring Username and Password Security Front Panel Security 2 22 ...
Страница 58: ...Virus Throttling Contents Operating Notes 3 30 Connection Rate Log and Trap Messages 3 31 3 2 ...
Страница 88: ...Virus Throttling Connection Rate Log and Trap Messages This page is intentionally unused 3 32 ...
Страница 118: ...Web and MAC Authentication Client Status This page intentionally unused 4 30 ...
Страница 230: ...Configuring Secure Socket Layer SSL Common Errors in SSL setup This page is intentionally unused 8 22 ...
Страница 356: ...Configuring and Monitoring Port Security Operating Notes for Port Security 11 44 ...
Страница 370: ...Using Authorized IP Managers Operating Notes This page is intentionally unused 12 14 ...
Страница 388: ...10 Index ...
Страница 389: ......