Key Management System
Configuring Key Chain Management
N o t e
[ key-string
< key_str >
]
This option specifies the key value referenced by the
protocol using the key. The
< key_str >
can be any
string up to 14 characters in length.
accept-lifetime <
mm/dd/yy
[
yy
]
hh:mm:ss
| now >
Specifies the
start
date and time of the valid period
in which the switch can use this key to authenticate
inbound packets.
duration <
mm/dd/yy
[
yy
]
hh:mm:ss
|
seconds
>
Specifies the
time period
during which the switch
can use this key to authenticate inbound packets.
Duration is either an end date and time or the
number of seconds to allow after the start date and
time (which is the
accept-lifetime
setting
)
.
send-lifetime <
mm/dd/yy[yy] hh:mm:ss
| now>
Specifies the
start
date and time of the valid period
in which the switch can transmit this key as
authentication for outbound packets.
duration <
mm/dd/yy[yy] hh:mm:ss
|
seconds
>
Specifies the
time period
during which the switch
can use this key to authenticate outbound packets.
Duration is either an end date and time or the
number of seconds to allow after the start date and
time (which is the
accept-lifetime
setting
)
.
show key-chain
< chain_name >
Displays the detail information about the keys used
in the key chain named
< chain_name >
.
Using time-dependent keys requires that all the switches have accurate,
synchronized time settings. You can manually set the time or use the Time
protocol feature included in the switches. For more information, refer to the
chapter covering time protocols in the
Management and Configuration
Guide
for your switch.
For example, to add a number of keys to the key chain entry “Procurve2”:
15-6
Содержание PROCURVE 2910AL
Страница 1: ...Access Security Guide ProCurve Switches W 14 03 2910al www procurve com ...
Страница 2: ......
Страница 3: ...HP ProCurve 2910al Switch February 2009 W 14 03 Access Security Guide ...
Страница 84: ...Configuring Username and Password Security Front Panel Security 2 36 ...
Страница 156: ...TACACS Authentication Operating Notes 4 30 ...
Страница 288: ...Configuring Secure Socket Layer SSL Common Errors in SSL setup 8 22 ...
Страница 416: ...Configuring Advanced Threat Protection Using the Instrumentation Monitor 10 28 ...
Страница 516: ...Configuring Port Based and User Based Access Control 802 1X Messages Related to 802 1X Operation 12 76 ...
Страница 527: ...Configuring and Monitoring Port Security Port Security Figure 13 4 Examples of Show Mac Address Outputs 13 11 ...
Страница 572: ...Using Authorized IP Managers Operating Notes 14 14 ...
Страница 592: ...12 Index ...
Страница 593: ......
Страница 594: ... Copyright 2009 Hewlett Packard Development Company L P February 2009 Manual Part Number 5992 5439 ...