Configuring IP Routing Protocol-Independent Features

IP Routing Protocol-Independent Configuration Examples

interface async 1

ip policy route-map equal-access

!

route-map equal-access permit 10 match ip address 1

set ip default next-hop 172.16.6.6 route-map equal-access permit 20

match ip address 2

set ip default next-hop 192.168.7.7 route-map equal-access permit 30

set default interface null0

Key Management Examples

The following example configures a key chain named trees. In this example, the software will always accept and send willow as a valid key. The key chestnut will be accepted from 1:30 p.m. to 3:30 p.m. and be sent from 2:00 p.m. to 3:00 p.m. The overlap allows for migration of keys or discrepancy in the set time of the router. Likewise, the key birch immediately follows chestnut, and there is a 30-minute leeway on each side to handle time-of-day differences.

interface ethernet 0

ip rip authentication key-chain trees ip rip authentication mode md5

!

router rip network 172.19.0.0 version 2

!

key chain trees key 1 key-string willow key 2

key-string chestnut

accept-lifetime 13:30:00 Jan 25 1996 duration 7200 send-lifetime 14:00:00 Jan 25 1996 duration 3600 key 3

key-string birch

accept-lifetime 14:30:00 Jan 25 1996 duration 7200 send-lifetime 15:00:00 Jan 25 1996 duration 3600

The following example configures a key chain named trees:

key chain trees key 1 key-string willow key 2 key-string chesnut

accept-lifetime 00:00:00 Dec 5 1995 23:59:59 Dec 5 1995 send-lifetime 06:00:00 Dec 5 1995 18:00:00 Dec 5 1995

!

interface Ethernet0

ip address 172.19.104.75 255.255.255.0 secondary ip address 172.16.232.147 255.255.255.240

ip rip authentication key-chain trees media-type 10BaseT

!

interface Ethernet1 no ip address shutdown media-type 10BaseT

Cisco IOS IP Configuration Guide

IPC-394

Page 440
Image 440
Cisco Systems 78-11741-02 manual Key Management Examples, Following example configures a key chain named trees, IPC-394