This section describes how to configure basic Keychain functions.
Keychain is used to provide authentication support to the applications. A keychain can have one or more key-ids. Key-id comprises of authentication algorithm and the key-string (secret shared key). Each key-id is associated with send and accept lifetime. Based on the send and accept lifetime, a key-id will be send-active or receive-active or both. When the key-id is send-active or receive-active, it will be used for authenticated communication. When the key-id is send-active, then it will be used to send out authenticated packet. On the receiver side that key-id should be receive-active to process the authenticated packet. The administrator has to configure the key-ids under the keychain in such a way that both sides can communicate without any packet loss.