Cisco Cisco Tunnel Terminating Gateway (TTG)
Access Control
▀ Access Control via Blacklist or Whitelist
▄ IPSec Reference, StarOS Release 18
144
For a crypto template the configuration sequence is:
configure
context ctxt_name
crypto template template_name ikev2-dynamic
whitelist
Refer to the Command Line Interface Reference for a complete description of these commands and their keywords.
Exec Mode
crypto blacklist file update
Updates the blacklist (access denied) file using the path specified when the blacklist was enabled.
crypto blacklist file update
Refer to the Command Line Interface Reference for a complete description of these commands and their keywords. For
additional information on blacklisting, refer to the System Administration Guide
additional information on blacklisting, refer to the System Administration Guide
crypto whitelist file update
Updates the whitelist (access granted) file using the path specified when the whitelist was enabled.
crypto whitelist file update
Refer to the Command Line Interface Reference for a complete description of these commands and their keywords. For
additional information on blacklisting, refer to the System Administration Guide
additional information on blacklisting, refer to the System Administration Guide
show Commands
show crypto blacklist file
Displays the contents of the blacklist (access denied) file.
show crypto blacklist file
Refer to the Statistics and Counters Reference for a description of the information output by this command.
show crypto whitelist file
Displays the contents of the whitelist (access granted) file.
show crypto blacklist file
Refer to the Statistics and Counters Reference for a description of the information output by this command.