Introduction to Keychain

Keychain provides authentication function to all the applications. The keychain also provides dynamic change of authentication keys without any packet drops.

Applications exchange authenticated packets on networks for security reasons. Authentication algorithms along with the secret shared key are used to determine whether a message sent over an insecure channel has been tampered with. This type of authentication requires that the sender and the receiver share the secret key and the authentication algorithm used to authenticate the packet. Also the secret key should never be sent over the network.

If each application maintains its own set of authentication rules (authentication algorithm and shared secret key), then there are many instances in which the same set of authentication is used. This results in duplication of data and reprocessing of the authentication information. Also each of the applications uses a constant authentication key unless the administrator of the network changes the key manually. The manual change of authentication is a cumbersome procedure and during the change of keys, there can be packet drops as it is very difficult to change the keys instantaneously on all the routers.

Thus the system needs a mechanism to achieve centralization of all authentication processing and dynamic change of authentication keys without much human intervention. To achieve this functionality the keychain module is used.

The NetEngine 8000 F supports the following keychain features:

Copyright © Huawei Technologies Co., Ltd.
Copyright © Huawei Technologies Co., Ltd.