IPSec Configuration Example
577
Displaying and Debugging the crypto card
Use the
debugging
,
reset
and
display
command in all views.
Table 655
Display and Debug NDEC Card
IPSec Configuration
Example
The following sections demonstrate the following IPSec configurations:
■
Creating an SA Manually
■
Creating an SA in IKE Negotiation Mode
■
Encrypting, Decrypting, and Authenticating NDEC Cards
Creating an SA Manually
Establish a security tunnel between Router-A and Router-B to perform security
protection for the data streams between PC-A represented subnet (10.1.1.x) and
PC-B represented subnet (10.1.2.x). The security protocol adopts ESP protocol,
algorithm adopts DES, and authentication algorithm adopts sha1-hmac-96.
Operation
Command
Display the detailed information of crypto
cards (applicable to crypto cards)
display encrypt-card details [
slot-id
]
Display all established Security Association
on crypto card (applicable to crypto card)
display encrypt-card ipsec sa all [
slot-id ]
Display a specified Security Association on
crypto card (applicable to crypto card)
display encrypt-card ipsec sa
parameters
remote-address protocol
spi-number
Display statistical information of the
security packets processing on crypto card
(applicable to crypto card)
display encrypt-card statistic [
slot-id ]
Display current operating status of crypto
card (applicable to crypto card)
display encrypt-card status [ slot-id
]
Display current operating logging of
crypto card (applicable to crypto card)
display encrypt-card syslog [
slot-id
]
Display version number of crypto card
(applicable to crypto card)
display encrypt-card version [
slot-id ]
Delete all established Security Association
(applicable to crypto card)
reset encrypt-card sa all [ slot-id ]
Delete the specified Security Association
on crypto card (applicable to crypto card)
reset encrypt-card sa parameters
remote-address
protocol
spi-number
Clear the statistical information of security
packets on crypto card (applicable to
crypto card)
reset encrypt-card statistic [
slot-id ]
Clear all the logging information on the
crypto card (applicable to crypto cards)
reset encrypt-card syslog [
slot-id
]
Enable the debugging of information,
packets, SA, command, error and other
information (applicable to crypto cards)
debugging encrypt-card
{
all | packet
| sa | command | error | misc } [
slot-id
]
Enable the debugging of the main
software on the crypto card (applicable to
crypto cards)
debugging encrypt-card host
{
all |
packet | sa | command | error | misc
}
Содержание 3036
Страница 1: ...http www 3com com 3Com Router Configuration Guide Published March 2004 Part No 10014299 ...
Страница 4: ...VPN 615 RELIABILITY 665 QOS 681 DIAL UP 721 ...
Страница 6: ...2 ABOUT THIS GUIDE ...
Страница 7: ...I GETTING STARTED Chapter 1 3Com Router Introduction Chapter 2 3Com Router User Interface ...
Страница 8: ...4 ...
Страница 16: ...12 CHAPTER 1 3COM ROUTER INTRODUCTION ...
Страница 34: ...30 ...
Страница 60: ...56 CHAPTER 3 SYSTEM MANAGEMENT ...
Страница 88: ...84 CHAPTER 5 CONFIGURING NETWORK MANAGEMENT RouterA interface ethernet 0 RouterA Ethernet0 rmon promiscuous ...
Страница 98: ...94 CHAPTER 6 DISPLAY AND DEBUGGING TOOLS ...
Страница 110: ...106 ...
Страница 114: ...110 CHAPTER 8 INTERFACE CONFIGURATION OVERVIEW ...
Страница 158: ...154 CHAPTER 10 CONFIGURING WAN INTERFACE ...
Страница 168: ...164 ...
Страница 188: ...184 CHAPTER 13 CONFIGURING PPPOE CLIENT ...
Страница 192: ...188 CHAPTER 14 CONFIGURING SLIP Router ip route static 0 0 0 0 0 0 0 0 10 110 0 1 ...
Страница 248: ...244 CHAPTER 16 CONFIGURING LAPB AND X 25 ...
Страница 292: ...288 CHAPTER 18 CONFIGURING HDLC Enable HDLC packet debugging debugging hdlc packet interface type number ...
Страница 320: ...316 ...
Страница 330: ...326 CHAPTER 20 CONFIGURING IP ADDRESS ...
Страница 362: ...358 CHAPTER 21 CONFIGURING IP APPLICATION ...
Страница 374: ...370 CHAPTER 23 CONFIGURING IP COUNT ...
Страница 406: ...402 CHAPTER 25 CONFIGURING DLSW ...
Страница 408: ...404 ...
Страница 452: ...448 CHAPTER 29 CONFIGURING OSPF ...
Страница 482: ...478 CHAPTER 30 CONFIGURING BGP ...
Страница 494: ...490 CHAPTER 31 CONFIGURING IP ROUTING POLICY ...
Страница 502: ...498 ...
Страница 508: ...504 CHAPTER 33 IP MULTICAST ...
Страница 514: ...510 CHAPTER 34 CONFIGURING IGMP ...
Страница 526: ...522 CHAPTER 36 CONFIGURING PIM SM ...
Страница 528: ...524 ...
Страница 532: ...528 CHAPTER 37 CONFIGURING TERMINAL ACCESS SECURITY ...
Страница 550: ...546 CHAPTER 38 CONFIGURING AAA AND RADIUS PROTOCOL ...
Страница 590: ...586 CHAPTER 40 CONFIGURING IPSEC ...
Страница 599: ...IX VPN Chapter 42 Configuring VPN Chapter 43 Configuring L2TP Chapter 44 Configuring GRE ...
Страница 600: ...596 ...
Страница 638: ...634 CHAPTER 43 CONFIGURING L2TP ...
Страница 649: ...X RELIABILITY Chapter 45 Configuring a Standby Center Chapter 46 Configuring VRRP ...
Страница 650: ...646 ...
Страница 666: ...662 ...
Страница 670: ...666 CHAPTER 47 QOS OVERVIEW ...
Страница 700: ...696 CHAPTER 49 CONGESTION MANAGEMENT ...
Страница 706: ...702 CHAPTER 50 CONGESTION AVOIDANCE ...
Страница 707: ...XII DIAL UP Chapter 51 Configuring DCC Chapter 52 Configuring Modem ...
Страница 708: ...704 ...
Страница 762: ...758 CHAPTER 52 CONFIGURING MODEM ...