< Home

Applying the Keychain

Context

The keychain only takes effect after it is applied to an application.

This section uses RIP as an example to describe how to apply the keychain to applications. Different applications may use different commands to apply the Keychain. Table 1 lists the commands used by different applications.
Table 1 Protocols that support the keychain authentication
Protocol Link

RIP

rip authentication-mode

MSDP

peer keychain(MSDP)

OSPF

authentication-mode (OSPF)

ospf authentication-mode

IS-IS

area-authentication-mode

isis authentication-mode

BGP\BGP4+

peer keychain (BGP)

MPLS LDP

authentication key-chain

MPLS RSVP

mpls rsvp-te authentication

Procedure

  1. Run system-view

    The system view is displayed.

  2. Run interface vlanif vlanif-id

    The VLANIF interface view is displayed.

  3. Run rip authentication-mode md5 nonstandard { keychain keychain-name | { plain plain-text | [ cipher ] password-key } key-id }

    The keychain used by RIP is configured.

Copyright © Huawei Technologies Co., Ltd.
Copyright © Huawei Technologies Co., Ltd.
< Previous topic Next topic >