Cisco Cisco Packet Data Interworking Function (PDIF) Fascicule
Crypto Template Configuration Mode Commands
authentication ▀
Cisco ASR 5x00 Command Line Interface Reference ▄
2817
encrypted key
value
: Specifies that the pre-shared key used for authentication is encrypted.
value
must
be an alphanumeric string of 1 through 255 characters for releases prior to 15.0, or 15 through 444 characters
for release 15.0 and higher.
for release 15.0 and higher.
key
clear_text
: Specifies that the pre-shared key used for authentication is clear text.
clear_text
must
be an alphanumeric string of 1 through 255 characters.
remote { certificate | eap-profile name [ second-phase eap-profile name ] | pre-
shared-key { encrypted key value | key clear_text }
shared-key { encrypted key value | key clear_text }
Specifies the remote authentication method required for services using the crypto template.
certificate
: Specifies that the certificate method of remote authentication must be used for services using
the crypto template.
eap-profile name [ second-phase eap-profile name ]
: Specifies that remote authentication is to
be performed using a named EAP profile.
name
must be an alphanumeric string of 1 through 127 characters.
Entering this keyword places the CLI in the EAP Authentication Configuration Mode.
The
The
second-phase eap-profile name
is only required for installations using multiple authentications.
name
must be an alphanumeric string of 1 through 127 characters.
pre-shared-key { encrypted key value | key clear_text }
: Specifies that a pre-shared key is
to be used for services using the crypto template.
encrypted key
value
configures an encrypted pre-
shared key used for authentication.
value
must be an alphanumeric string of 1 through 255 characters for
releases prior to 15.0, or 15 through 444 characters for release 15.0 and higher.
key value
configures a clear
text pre-shared key used for authentication.
clear_text
must be an alphanumeric string of 1 through 255
characters.
Usage
Use this command to specify the type of authentication performed for subscribers or gateways attempting to
access the service using this crypto template.
Entering the
access the service using this crypto template.
Entering the
authentication eap-profile
command results in the following prompt:
[context_name]hostname(cfg-crypto-tmpl-eap-key)#
EAP Authentication Configuration Mode commands are defined in the EAP Authentication Configuration
Mode Commands chapter.
Mode Commands chapter.
Example
The following command enables authentication via an EAP profile named
eap23
for subscribers using the
service with this crypto template:
authentication eap-profile eap23