Usage Scenario
Each keychain consists of multiple key IDs that are valid within different time periods and each key ID is configured with an authentication algorithm. When a key ID becomes valid, the corresponding authentication algorithm is used, ensuring the dynamic change of authentication algorithms. Configure different key IDs for packet sending and receiving to be valid within different time periods.
Implementation Procedure
There are two keychain validity modes:
- Absolute time range: In this mode, keychains are valid within a certain period and are invalid out of the period.
- Periodic time range: In this mode, keychains are valid periodically. After one period ends, keychains continue to be valid within next period.
The mode in which key IDs for packet receiving become valid must be identical with that configured for the keychain.
Precautions
Only one key ID is valid within a time period. In other words, the send time periods of different key-ids cannot overlap with each other.