Key Management System
Configuring Key Chain Management
duration <
mm/dd/yy
[
yy
]
hh:mm:ss
|
seconds
>
Specifies the
time period
during which the switch
can use this key to authenticate inbound packets.
Duration is either an end date and time or the
number of seconds to allow after the start date and
time (which is the
accept-lifetime
setting
)
.
send-lifetime <
mm/dd/yy[yy] hh:mm:ss
| now>
Specifies the
start
date and time of the valid period
in which the switch can transmit this key as
authentication for outbound packets.
duration <
mm/dd/yy[yy] hh:mm:ss
|
seconds
>
Specifies the
time period
during which the switch
can use this key to authenticate outbound packets.
Duration is either an end date and time or the
number of seconds to allow after the start date and
time (which is the
accept-lifetime
setting
)
.
show key-chain
< chain_name >
Displays the detail information about the keys used
in the key chain named
< chain_name >
.
N o t e
Using time-dependent keys requires that all the switches have accurate,
synchronized time settings. You can manually set the time or use the Time
protocol feature included in the switches. For more information, refer to the
chapter covering time protocols in the
Management and Configuration
Guide
for your switch.
For example, to add a number of keys to the key chain entry “Procurve2”:
Adds a key with
full time and date
Adds a key with
duration
expressed in
seconds.
Figure 13-3. Adding Time-Dependent Keys to a Key Chain Entry
13-6
Содержание J8697A
Страница 1: ...6200yl Access Security Guide 5400zl 3500yl ProCurve Switches K 11 XX www procurve com ...
Страница 2: ......
Страница 22: ...Product Documentation Feature Index xx ...
Страница 55: ...Configuring Username and Password Security Front Panel Security 2 21 ...
Страница 56: ...Configuring Username and Password Security Front Panel Security 2 22 ...
Страница 58: ...Virus Throttling Contents Operating Notes 3 30 Connection Rate Log and Trap Messages 3 31 3 2 ...
Страница 88: ...Virus Throttling Connection Rate Log and Trap Messages This page is intentionally unused 3 32 ...
Страница 118: ...Web and MAC Authentication Client Status This page intentionally unused 4 30 ...
Страница 230: ...Configuring Secure Socket Layer SSL Common Errors in SSL setup This page is intentionally unused 8 22 ...
Страница 356: ...Configuring and Monitoring Port Security Operating Notes for Port Security 11 44 ...
Страница 370: ...Using Authorized IP Managers Operating Notes This page is intentionally unused 12 14 ...
Страница 388: ...10 Index ...
Страница 389: ......