38-105
Catalyst 3750 SwitchSoftware Configuration Guide
OL-8550-09
Chapter38 Configuring IP Unicast Routing
Configuring Protocol-Independent Features
Beginning in privileged EXEC mode, follow these steps to manage authentication keys:
To remove the key chain, use the no key chain name-of-chain global configuration command.
Command Purpose
Step1 configure terminal Enter global configuration mode.
Step2 key chain name-of-chain Identify a key chain, and enter key chain configuration
mode.
Step3 key number Identify the key number. The range is 0 to 2147483647.
Step4 key-string text Identify the key string. The string can contain from 1 to
80 uppercase and lowercase alphanumeric characters,
but the first character cannot be a number.
Step5 accept-lifetime start-time {infinite | end-time | duration
seconds}
(Optional) Specify the time period during which the key
can be received.
The start-time and end-time syntax can be either
hh:mm:ss Month date year or hh:mm:ss date Month
year. The default is forever with the default start-time
and the earliest acceptable date as January 1, 1993. The
default end-time and duration is infinite.
Step6 send-lifetime start-time {infinite | end-time | duration
seconds}
(Optional) Specify the time period during which the key
can be sent.
The start-time and end-time syntax can be either
hh:mm:ss Month date year or hh:mm:ss date Month
year. The default is forever with the default start-time
and the earliest acceptable date as January 1, 1993. The
default end-time and duration is infinite.
Step7 end Return to privileged EXEC mode.
Step8 show key chain Display authentication key information.
Step9 copy running-config startup-config (Optional) Save your entries in the configuration file.