EasyManua.ls Logo

Motorola RFS7000 Series - Crypto

Motorola RFS7000 Series
588 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
5-17
5.1.8 crypto
Global Configuration Commands
Use this command to configure encryption related commands.
Syntax
crypto(ipsec|isakmp|key|map|pki)
crypto ipsec (security-association|transform-set)
crypto ipsec (security-association)(lifetime)(kilobyte|Seconds)WORD
crypto ipsec (transform-set)(set name)[ah-md5-hmac|ah-sha-hmac|esp-
3des|espaes|esp-aes-192|esp-aes-256|esp-des|esp-md5-hmac|esp-sha-hmac]
crypto isakmp (client|keepalive|key|peer|policy)
crypto isakmp (client)(configuration)(group)(default)
crypto key(export|generate|import|zeroize)
crypto key export rsa <name> [URL](password)
crypto key generate rsa <name> <1024-2048>
crypto key import rsa <name> [URL] (password)
crypto key zeroize rsa <name>
crypto map (map name)<sequence number> (ipsec-isakmp| ipsec-manual)dynamic
crypto pki(authenticate|enroll|export|import|trustpoint)
crypto pki authenticate <name> (terminal|URL)
crypto pki enroll<name> (request|self-signed)
crypto pki [import|export] <name> (request|trustpoint)(URL)
NOTE crypto isakmp(policy)Priority leads you to config-crypto- isakmp
instance. For more details see Crypto - isakmp Instance on page 6-1.
crypto isakmp(client)configuration group default leads you to
config-crypto-group instance. For more details see Crypto - group Instance on
page 7-1.
crypto isakmp(peer)IP Address leads you to config-crypto-peer instance.
For more details see Crypto - peer Instance on page 8-1.
crypto ipsec transformset (name) <value> leads you to config-crypto-
ipsec. Use the crypto ipsec transform-set command to define the transform
configuration for securing data (e.g., esp-3des, esp-shahmac, etc.). The transform-
set is then assigned to a crypto map using the map’s set transform-set command.
For more details see Crypto - ipsec Instance on page 9-1.
config-crypto-map leads to config-crypto-map instance. For more
information, see Crypto - map Instance on page 10-1.
crypto pki trustpoint mode leads to (config-trustpoint) instance. For
more information, see Crypto - trustpoint Instance on page 11-19.

Table of Contents

Other manuals for Motorola RFS7000 Series

Related product manuals