Route-map configuration mode, Key chain configuration mode, Response time reporter configuration mode – AIS Router AI2524 User Manual
Page 53: Access-list configuration mode, Key chain key configuration mode, Response time reporter configuration mod

Chapter 4: Understanding the User Interface
August 1997
Page 4-17
2524UM
Route-Map Configuration Mode
Use the route-map configuration mode to configure routing table and
source and destination information. In this example, a route map
named arizona1 is configured.
Router(config)# route-map arizona1
Router(config-route-map)# ?
Route Map configuration commands:
exit
Exit from route-map configuration mode
help
Description of the interactive help system
match
Match values from routing table
no
Negate or set default values of a command
set
Set values in destination routing protocol
Key Chain Configuration Mode
From key chain configuration mode, you can manage authentication
keys that routing protocols use. To enter this configuration mode and
use Key Chain configuration commands, you must first enable RIP au-
thentication. For more information about enabling RIP, refer to
.
Key Chain Key Configuration Mode
Once you define a key chain, use the key chain key configuration
mode to configure the keys on the key chain.
Response Time Reporter Configuration Mode
Use the response time reporter feature to monitor network perfor-
mance, network resources, and applications by measuring response
times and availability. With this feature you can perform troubleshoot-
ing, problem notifications, and pre-problem analysis based on re-
sponse time reporter statistics.
Access-List Configuration Mode
All Internet Protocol (IP) access lists can be identified by a number;
standard IP access lists are numbered 1 to 99 and extended IP access
lists are numbered 100 to 199. Some IP access lists can also be identi-
fied by a name. Use access-list configuration mode when you are cre-
ating a named IP access list.