Chapter 4: Understanding the User Interface

Route-Map Configuration Mode

Use the route-map configuration mode to configure routing table and source and destination information. In this example, a route map named arizona1 is configured.

Router(config)# route-map arizona1

Router(config-route-map)# ?

Route Map configuration commands:

exit

Exit from route-map configuration mode

help

Description of the interactive help system

match

Match values from routing table

no

Negate or set default values of a command

set

Set values in destination routing protocol

 

 

Key Chain Configuration Mode

From key chain configuration mode, you can manage authentication keys that routing protocols use. To enter this configuration mode and use Key Chain configuration commands, you must first enable RIP au- thentication. For more information about enabling RIP, refer to Enable RIP.

Key Chain Key Configuration Mode

Once you define a key chain, use the key chain key configuration mode to configure the keys on the key chain.

Response Time Reporter Configuration Mode

Use the response time reporter feature to monitor network perfor- mance, network resources, and applications by measuring response times and availability. With this feature you can perform troubleshoot- ing, problem notifications, and pre-problem analysis based on re- sponse time reporter statistics.

Access-List Configuration Mode

All Internet Protocol (IP) access lists can be identified by a number; standard IP access lists are numbered 1 to 99 and extended IP access lists are numbered 100 to 199. Some IP access lists can also be identi- fied by a name. Use access-list configuration mode when you are cre- ating a named IP access list.

August 1997

Page 4-17

2524UM

 

Page 53
Image 53
AIS AI2524 Key Chain Configuration Mode, Key Chain Key Configuration Mode, Response Time Reporter Configuration Mode