Product specifications

Chapter 4: System Management Efficient Networks
®
Router family
Technical Reference Guide
Page 4-30 Efficient Networks
®
NOTE:
Feature keys are generated for a particular device by serial number, feature name,
and expiration date, and when added, are stored in the systems memory in an
encrypted format; for security purposes, this renders the key information ambiguous
and not recoverable.
NOTE:
The following commands (key add, update, unrevoke, and delete require a save
command to make the changes persistent across a reboot. These commands do not
apply to Manufacturing keys.
Feature keys can be added from either the command line or the Web Management
Interface (WMI) Add Feature Page on page 8-28. When using the Command Line
Interface, add the key using the following command:
-> key add <keystring>
Feature keys are generated with a expiration date. If continued use of the feature is
desired, an update key will be necessary to extent the key expiration date. The
update key command is used to replace an existing Activation key with a new
Activation key. To add the updated Activation key refer to the Update Feature Page
on page 8-30, or use the following command:
-> key update <keystring>
Once a feature has been revoked, an unrevocation key must be used to activate the
revoked key, the command to add the unrevoke key is shown below. To unrevoke a
key via the WMI, see theUnrevoke Feature Page on page 8-33. For more
information on feature revocation, see Feature Revocation on page 4-33.
-> key unrevoke <keystring>
Features keys can also be deleted from the system. When a key is deleted, all feature
configuration information is cleared and access is removed. To delete a key, use the
following command or refer to the Delete Feature Page on page 8-29:
-> key delete <keystring>
If desired, the feature can be added again re-using the original activation key; this will
not change the expiration date. You may also acquire a new activation key. The
feature can also be disabled without deleting the key. For more information on
disabling a key, see Enabling and Disabling Features on page 4-33.