In the event that a TSIG key becomes compromised, you can perform an emergency rollover to regenerate the key(s).
After regenerating one or more TSIG keys, you need to deploy the configuration to your server or servers.
To roll over a TSIG key:
In the event that a TSIG key becomes compromised, you can perform an emergency rollover to regenerate the key(s).
After regenerating one or more TSIG keys, you need to deploy the configuration to your server or servers.
To roll over a TSIG key: