Index
SC-237
Cisco IOS XR System Security Configuration Guide
crypto mib ipsec flowmib history failure size
command
SC-128
crypto nat-transparency command SC-119
D
dead-server detection
RADIUS
SC-194
radius-server dead-criteria time command SC-195
radius-server dead-criteria tries command SC-195
radius-server deadtime command SC-194
deadtime command SC-202
DES (Data Encryption Standard)
definition
SC-21
IKE policy parameter SC-23
description (ISAKMP peer) command SC-31
device configuration, MPP SC-230
DF (Don’t Fragment) bit override
crypto ipsec df-bit command
SC-114
overview SC-98
procedure SC-114
domain names
certification authority interoperability,
configuring
SC-6
DPD (Dead Peer Detection)
message configuration
SC-63
periodic message SC-32
E
Easy VPN (Virtual Private Network) features
auto-update
SC-29
banner SC-29
browser-proxy SC-29
URL configuration SC-29
encrypted nonces
See RSA encrypted nonces
encryption algorithm
See IKE, algorithms
end-time, key chain SC-76
H
hash algorithm
See IKE, algorithms
high availability overview
SC-103
hitless key rollover
accept-tolerance command
SC-78
procedure SC-78
host names
certification authority interoperability, configuring
(examples)
SC-6
I
IKE (Internet Key Exchange) security protocol
algorithms
encryption
SC-35
hash SC-35
options SC-24
authentication
methods
SC-24, SC-35
DH (Diffie-Hellman)
group identifier, specifying
SC-35
IKE policy parameter SC-23
enabling and disabling SC-33
extended authentication SC-30
group identifier, specifying SC-35
ISAKMP identity, configuring SC-26
keys
See keys, preshared; keys, preshared using AAA
server; RSA keys
mode configuration
SC-28
negotiations SC-24