Index
SC-238
Cisco IOS XR System Security Configuration Guide
policies
configuring (example)
SC-69
identifying SC-35
multiple SC-25
parameters SC-23, SC-24
purpose SC-23
viewing SC-36
policies, configuring SC-34
requirements
RSA encrypted nonces method
SC-25
RSA signatures method SC-25
supported standards SC-21
See also IPSec; RSA encrypted nonces; SAs
IKE peer, configuration
description (ISAKMP peer) command
SC-31
how to add SC-57
inband management interface, MPP
allow command
SC-230
definition SC-228
inband command SC-230
interface command SC-230
interface service-gre command SC-103
interface service-ipsec command SC-103
IPSec (IPSec Network Security Protocol)
CAs
implementing with
SC-5
implementing without SC-5
IPSec (IP Security)
checkpointing, description
SC-98
crypto access lists SC-95
cautions, creating SC-129
creating SC-106
purpose SC-96
crypto profiles SC-94
applying to transport SC-131
applying to tunnel-ipsec interfaces SC-130
static or dynamic, configuring SC-109
dynamic crypto profiles SC-95
group policy definition
mode configuration
SC-36
lifetimes
global, setting
SC-105
prerequisites, implementing SC-92
transform sets
defining
SC-108
description SC-96
IPSec-protected GRE virtual interface, procedure SC-136
IPSec VPN SPA
antireplay window
SC-98
DF bit override overview SC-98
DPD message SC-32
how to display hardware SC-101
load balancing and high availability SC-103
NAT transparency SC-99
overview SC-101
prefragmentation SC-99
restrictions SC-93
SA idle timers SC-99
SNMP SC-101
ISAKMP SC-21
See also IKE SC-19
ISAKMP profile
considerations
SC-27
locally sourced and destined traffic procedure SC-58
overview SC-26
service interfaces procedure SC-64
K
key (key chain) command SC-80
key chain
configuration (example)
SC-87
configuring SC-77
end-time SC-76
key chain command SC-77
key identifier, configuring SC-79
lifetime SC-76