To configure the log encryption key
Before you begin
Use this procedure to create a log encryption key. The log encryption key prevents external attackers from obtaining critical network information from the configuration file, such as users, IP addresses, and protocols. This procedure applies to 7250 IXR-6, 7250 IXR-R6, 7250 IXR-10, 7250 IXR-R4, 7250 IXR-e, 7250 IXR-e2, 7250 IXR-e2c, 7250 IXR-ec, 7250 IXR-s, 7750 SR, 7950 XRS, and VSR NEs.
Steps
1 |
On the equipment tree, right-click on an NE and choose Properties. The Network Element (Edit) form opens. |
2 |
Click on the Globals tab, then on the Log Configuration tab. |
3 |
Configure the Encryption Key parameter. |
4 |
Click OK and close the form. End of steps |