EasyManuals Logo

Motorola RFS7000 Series User Manual

Motorola RFS7000 Series
588 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #213 background imageLoading...
Page #213 background image
5-17
5.1.8 crypto
Global Configuration Commands
Use this command to configure encryption related commands.
Syntax
crypto(ipsec|isakmp|key|map|pki)
crypto ipsec (security-association|transform-set)
crypto ipsec (security-association)(lifetime)(kilobyte|Seconds)WORD
crypto ipsec (transform-set)(set name)[ah-md5-hmac|ah-sha-hmac|esp-
3des|espaes|esp-aes-192|esp-aes-256|esp-des|esp-md5-hmac|esp-sha-hmac]
crypto isakmp (client|keepalive|key|peer|policy)
crypto isakmp (client)(configuration)(group)(default)
crypto key(export|generate|import|zeroize)
crypto key export rsa <name> [URL](password)
crypto key generate rsa <name> <1024-2048>
crypto key import rsa <name> [URL] (password)
crypto key zeroize rsa <name>
crypto map (map name)<sequence number> (ipsec-isakmp| ipsec-manual)dynamic
crypto pki(authenticate|enroll|export|import|trustpoint)
crypto pki authenticate <name> (terminal|URL)
crypto pki enroll<name> (request|self-signed)
crypto pki [import|export] <name> (request|trustpoint)(URL)
NOTE crypto isakmp(policy)Priority leads you to config-crypto- isakmp
instance. For more details see Crypto - isakmp Instance on page 6-1.
crypto isakmp(client)configuration group default leads you to
config-crypto-group instance. For more details see Crypto - group Instance on
page 7-1.
crypto isakmp(peer)IP Address leads you to config-crypto-peer instance.
For more details see Crypto - peer Instance on page 8-1.
crypto ipsec transformset (name) <value> leads you to config-crypto-
ipsec. Use the crypto ipsec transform-set command to define the transform
configuration for securing data (e.g., esp-3des, esp-shahmac, etc.). The transform-
set is then assigned to a crypto map using the map’s set transform-set command.
For more details see Crypto - ipsec Instance on page 9-1.
config-crypto-map leads to config-crypto-map instance. For more
information, see Crypto - map Instance on page 10-1.
crypto pki trustpoint mode leads to (config-trustpoint) instance. For
more information, see Crypto - trustpoint Instance on page 11-19.

Table of Contents

Other manuals for Motorola RFS7000 Series

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Motorola RFS7000 Series and is the answer not in the manual?

Motorola RFS7000 Series Specifications

General IconGeneral
BrandMotorola
ModelRFS7000 Series
CategorySwitch
LanguageEnglish

Related product manuals