Configuring a keychain module

Complete the following steps to configure keychain module.

  1. Enter the configure terminal command to enter global configuration mode.
    device# configure terminal
  2. Configure a keychain profile.
    device(config)# keychain ruckus
  3. (Optional) Configure the tolerance value for the keys.
    device(config-ruckus)# tolerance 10000
  4. Configure a key by specifying a key identifier.
    device(config-ruckus)# key-id 1
  5. Configure the authentication algorithm to be used for the key.
    device(config-ruckus-key-1)# authentication-algorithm md5
    Authentication algorithms such as HMAC-SHA-1, HMAC-SHA-256, MD5, SHA-1, and SHA-256 are supported. The application or protocol chooses the cryptographic algorithm that matches its criteria.
  6. Configure the password to be used for the key.
    device(config-ruckus-key-1)# password abc
  7. Configure the time period during which the key on a keychain becomes active and can be received as a valid key.
    device(config-ruckus-key-1)# accept-lifetime start 10-10-17 10:10:10 end 10000 
    The expiry of the accept key can be configured as one of the following options: duration in seconds, infinite, or date and time format.
  8. Configure the time period during which the key on a keychain becomes active and is valid to be sent.
    device(config-ruckus-key-1)# send-lifetime start 10-10-17 10:10:10 end infinite 
    The expiry of the send key can be configured as one of the following options: duration in seconds, infinite, or date and time format.