Keychain; Table 32 Keychain Mapping - Nokia 7302 Basics, Management And Oam Manual

Intelligent services access manager/fttn/fx, fd 100/320gbps nt and fx nt ihub system
Hide thumbs Also See for 7302:
Table of Contents

Advertisement

"FD 100/320Gbps NT and FX NT IHub System
Basics, Management and OAM Guide"
4.1.2.2
A keychain is a set of up to 64 keys, where each key is {A[i], K[i], V[i], S[i], T[i], S'[i],
T'[i]} as described in draft-bonica-tcp-auth-05.txt, Authentication for TCP-based
Routing and Management Protocols. They keys can be assigned to both sides of a
BGP or LDP peer.
The individual keys in a keychain have a begin- and end-time indicating when to use
this key.
These fields map to the CLI tree as:
Table 32
(1 of 2)
Issue: 10

Keychain

Keychain mapping
Field
Definition
i
The key identifier
expressed as an integer
(0...63)
A[i]
Authentication
algorithm to use with
key[i]
K[i]
Shared secret to use
with key[i].
V[i]
A vector that determines
whether the key[i] is to
be used to generate
MACs for inbound
segments, outbound
segments, or both.
S[i]
Start time from which
key[i] can be used by
sending TCPs.
T[i]
End time after which
key[i] cannot be used by
sending TCPs.
S'[i]
Start time from which
key[i] can be used by
receiving TCPs.
3HH-11982-AAAA-TQZZA
CLI
configure>system>security>keychain>direction>bi>entry
configure>system>security>keychain>direction>uni>receive> entry
configure>system>security>keychain>direction>uni>send>entry
configure>system>security>keychain>direction>bi>entry with algorithm
algorithm parameter
configure>system>security>keychain>direction>uni>receive> entry with
algorithm algorithm parameter
configure>system>security>keychain>direction>uni>send>entry with
algorithm algorithm parameter
configure>system>security>keychain>direction>uni>receive> entry with
shared secret parameter
configure>system>security>keychain>direction>uni>send>entry with
shared secret parameter
configure>system>security>keychain>direction>bi>entry with shared
secret parameter
configure>system>security>keychain>direction
configure>system>security>keychain>direction>bi>entry >begin-time
configure>system>security>keychain>direction>uni>send>entry
>begintime
Inferred by the begin-time of the next key (youngest key rule).
configure>system>security>keychain>direction>bi>entry >begin-time
configure>system>security>keychain>direction>bi>entry >tolerance
configure>system>security>keychain>direction>uni>receive >entry
>begin-time
configure>system>security>keychain>direction>uni>receive >entry
>tolerance
Security
43

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

73307360

Table of Contents