
send-key-id. There can be only one default send-key-id in a keychain. When any key-id
becomes active, the application uses the new active key-id instead of the default send-key-
id. Similarly when active key-id becomes inactive and when there is no other active key-
id then application uses the default send-key-id.
l
TCP-kind and TCP algorithm-id configuration
TCP based applications can communicate with other vendor nodes by using the
authenticated TCP connection. For authenticated communication, TCP uses TCP Enhanced
Authentication Option. Currently different vendors use different kind-value to represent
the TCP Enhanced Authentication Option type. So in order to communicate with other
vendors, kind-value should be made configurable, so that it can be changed based on the
type of vendor to which it is connected. Similarly TCP Enhanced Authentication Option
has a field named algorithm-id which represents the authentication algorithm type. As
algorithm-ids are not defined by IANA. Currently different vendor uses different algorithm-
id to represent the same algorithm. In order to communicate with the other vendors, user
has to configure the TCP algorithm-id in the keychain for the algorithms depending on the
peer node type.
13.3 Configuring Basic Keychain Functions
This section descries how to configure the basic functions of keychain module.
13.3.1 Establishing the Configuration Task
Applicable Environment
Keychain is used to provide authentication support to the applications. A keychain can have one
or multiple key-ids. Key-id comprises of authentication algorithm and the key-string (secret
shared key). Each key-id is associated with send and receive lifetime. Based on the send and
receive lifetime, a key-id will be send-active or receive-active or both. When the key-id is send-
active or receive-active, it will be used for authenticated communication. When the key-id is
send-active, then it will be used to send out authenticated packet. On the receiver side that key-
id should be receive-active to process the authenticated packet. The administrator has to
configure the key-ids under the keychain in such a way that both sides can communicate without
any packet loss.
Pre-configuration Tasks
Before configuring the keychain on the peer Routers, configure the Network Time Protocol
(NTP) so that the time is consistent on the two Routers.
Data Preparation
To configure basic keychain features, you need the following data.
No.
Data
1
Keychain name
2
Key-ids for the keychain
Huawei AR1200-S Series Enterprise Routers
Configuration Guide - Security
13 Keychain Configuration
Issue 02 (2012-03-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
265