DELL 6024 User Manual

Page of 474
Configuring Routing
345
Configuring Key Chains Using CLI Commands
The following table contains the CLI commands for configuring the key chains.
The following is an example of the CLI commands: 
Console (config)# key chain M
Console (config-key-chain)# key 1
Console (config-key)# key-string mountain
Console (config-key)# accept-lifetime duration 13:30:00 Jan 25 
2002 7200
Console (config-key)# send-lifetime duration 14:00:00 Jan 25 2002 
3600
Console (config-key)# exit
Console (config)# exit
Console# show key-chains
Table 8-5.
Key Chain CLI Commands
CLI Command
Description
key-chain 
name-
of-chain
Identifies an authentication key group.
key 
key-id
Identifies an authentication key on a key chain. 
key-string 
text
Specifies an authentication string for a key.
accept-lifetime 
start-time end-
time
 | {infinite 
start-time
 | 
duration 
start-
time seconds
} no 
accept-lifetime
Sets the time period during which the authentication key 
is valid for authenticating incoming packets.
send-lifetime 
start-time end-
time
 | {infinite 
start-time
 | 
duration 
start-
time seconds
}no 
send-lifetime
Sets the time period during which an authentication key is 
valid to generate an MD5 digest for outgoing packets.
show key-chains 
[
name-of-chain
]
Displays key chain information.