Manualsbrain.com
de
English
Español
Français
Italiano
Português
Русский
조선말, 한국어
日本語
中文
Handbücher
Marken
Cisco
Cisco Packet Data Gateway (PDG)
Cisco Cisco Packet Data Gateway (PDG)
Download
Like
Vollbild
Standard
Seite
von
161
Los
▀ Contents
▄ IPSec Reference, StarOS Release 16
vi
Enrollment Request with Polling .................................................................................................. 117
Certificate Update (Manual and Auto) .......................................................................................... 118
Certificate Update (Manual and Auto) with Polling ...................................................................... 118
Failure Response Handling (ip/cp/kup/pollRep)........................................................................... 119
CLI Commands ................................................................................................................................. 119
Exec Mode Commands ................................................................................................................ 119
Global Configuration Mode Commands ....................................................................................... 120
show and clear Commands.......................................................................................................... 121
Online Certificate Status Protocol (OCSP) ........................................................................................... 122
Overview ........................................................................................................................................... 122
Deployment Scenarios ..................................................................................................................... 122
Call Flows ......................................................................................................................................... 124
Successful OCSP Response ....................................................................................................... 124
Revoked OCSP Response........................................................................................................... 125
External Interface ............................................................................................................................. 125
CLI Commands ................................................................................................................................. 125
Context Configuration Mode ........................................................................................................ 125
CRL Fetching ........................................................................................................................................ 127
Overview ........................................................................................................................................... 127
CRL Downloads ................................................................................................................................ 128
Download from CDP Extension of Self-certificate ....................................................................... 128
Download from CDP Extension of Peer Certificate ..................................................................... 129
CLI Commands ................................................................................................................................. 130
Global Configuration Mode .......................................................................................................... 130
Context Configuration Mode ........................................................................................................ 130
show Commands ......................................................................................................................... 131
Rekeying SAs .................................................................................................. 133
Rekey Traffic Overlap ........................................................................................................................... 134
Overview ........................................................................................................................................... 134
Deployment Scenarios ..................................................................................................................... 135
Initiator and Responder Rekeying Behavior ..................................................................................... 135
Sequence Number-based Rekeying ..................................................................................................... 137
Overview ........................................................................................................................................... 137
Deployment Scenarios ..................................................................................................................... 137
CLI Commands ................................................................................................................................. 137
ipsec rekey ................................................................................................................................... 137
Crypto Map and Crypto Template Rekey Configurations ............................................................ 138
Access Control ................................................................................................ 139
Access Control via Blacklist or Whitelist ............................................................................................... 140
Overview ........................................................................................................................................... 140
Blacklisting ........................................................................................................................................ 141
Whitelisting ....................................................................................................................................... 142
Blacklist and Whitelist File Format ................................................................................................... 143
File Format and Content .............................................................................................................. 143
Supported IKE ID Types .............................................................................................................. 143
Deployment Scenarios ..................................................................................................................... 144
Blacklisting ................................................................................................................................... 144
Whitelisting ................................................................................................................................... 144
External Interfaces ............................................................................................................................ 144
CLI Commands ................................................................................................................................. 144
Global Configuration Mode .......................................................................................................... 144
Context Configuration Mode ........................................................................................................ 145
Exec Mode ................................................................................................................................... 146
Vorherige
Nächste
1
…
4
5
6
7
8
…
161