To configure the log encryption key

Before you begin

Use this procedure to create a log encryption key. The log encryption key prevents external attackers from obtaining critical network information from the configuration file, such as users, IP addresses, and protocols. This procedure applies to 7250 IXR-6, 7250 IXR-R6, 7250 IXR-10, 7250 IXR-R4, 7250 IXR-e, 7250 IXR-e2, 7250 IXR-e2c, 7250 IXR-ec, 7250 IXR-s, 7750 SR, 7950 XRS, and VSR NEs.

Steps
 

On the equipment tree, right-click on an NE and choose Properties. The Network Element (Edit) form opens.


Click on the Globals tab, then on the Log Configuration tab.


Configure the Encryption Key parameter.


Click OK and close the form.

End of steps