5-17
5.1.8 crypto
Global Configuration Commands
Use this command to configure encryption related commands.
Syntax
crypto(ipsec|isakmp|key|map|pki)
crypto ipsec (security-association|transform-set)
crypto ipsec (security-association)(lifetime)(kilobyte|Seconds)WORD
crypto ipsec (transform-set)(set name)[ah-md5-hmac|ah-sha-hmac|esp-
3des|espaes|esp-aes-192|esp-aes-256|esp-des|esp-md5-hmac|esp-sha-hmac]
crypto isakmp (client|keepalive|key|peer|policy)
crypto isakmp (client)(configuration)(group)(default)
crypto key(export|generate|import|zeroize)
crypto key export rsa <name> [URL](password)
crypto key generate rsa <name> <1024-2048>
crypto key import rsa <name> [URL] (password)
crypto key zeroize rsa <name>
crypto map (map name)<sequence number> (ipsec-isakmp| ipsec-manual)dynamic
crypto pki(authenticate|enroll|export|import|trustpoint)
crypto pki authenticate <name> (terminal|URL)
crypto pki enroll<name> (request|self-signed)
crypto pki [import|export] <name> (request|trustpoint)(URL)
NOTE crypto isakmp(policy)Priority leads you to config-crypto- isakmp
instance. For more details see Crypto - isakmp Instance on page 6-1.
crypto isakmp(client)configuration group default leads you to
config-crypto-group instance. For more details see Crypto - group Instance on
page 7-1.
crypto isakmp(peer)IP Address leads you to config-crypto-peer instance.
For more details see Crypto - peer Instance on page 8-1.
crypto ipsec transformset (name) <value> leads you to config-crypto-
ipsec. Use the crypto ipsec transform-set command to define the transform
configuration for securing data (e.g., esp-3des, esp-shahmac, etc.). The transform-
set is then assigned to a crypto map using the map’s set transform-set command.
For more details see Crypto - ipsec Instance on page 9-1.
config-crypto-map leads to config-crypto-map instance. For more
information, see Crypto - map Instance on page 10-1.
crypto pki trustpoint mode leads to (config-trustpoint) instance. For
more information, see Crypto - trustpoint Instance on page 11-19.