Cisco Cisco Packet Data Interworking Function (PDIF)
Global Configuration Mode Commands (A-K)
crypto remote-secret-list ▀
Command Line Interface Reference, StarOS Release 18 ▄
5387
crypto remote-secret-list
Specifies the remote secret list for storing remote secrets based on the ID type. This command sends you to the Remote
Secret List Configuration mode. Only one active remote-secret-list is supported per system.
Secret List Configuration mode. Only one active remote-secret-list is supported per system.
Product
All products supporting IPSec remote secrets
Important:
This command appears in the CLI for this release. However, it has not been qualified for use with
any current Cisco StarOS gateway products.
Privilege
Security Administrator
Mode
Exec > Global Configuration
configure
Entering the above command sequence results in the following prompt:
[local]host_name(config)#
Syntax
[ no ] crypto remote-secret-list listname
no
Deletes the remote-secret-list file from the system.
Important:
You must unbind the remote-secret-list from any crypto maps or templates
before it can be deleted.
listname
Specifies the name of the remote secret list as an alphanumeric string from 1 to 127 characters.
Usage
Use this command to specify the remote secret list for storing remote secrets based on the ID type. Only one
remote-secret-list can be configured per system. Executing this command places you in the Remote Secret
List Configuration mode.
This list of remote pre-shared keys is based on the remote ID type. The remote secret list can contain up to
1000 entries.
For additional information, refer to the Remote Secret List Configuration Commands chapter and the System
Administration Guide.
remote-secret-list can be configured per system. Executing this command places you in the Remote Secret
List Configuration mode.
This list of remote pre-shared keys is based on the remote ID type. The remote secret list can contain up to
1000 entries.
For additional information, refer to the Remote Secret List Configuration Commands chapter and the System
Administration Guide.
Example
The following command creates a remote-secret-list named rs-list:
crypto remote-secret-list rs-list