IPSec Configuration Example
577
Displaying and Debugging the crypto card
Use the
debugging
,
reset
and
display
command in all views.
Table 655
Display and Debug NDEC Card
IPSec Configuration
Example
The following sections demonstrate the following IPSec configurations:
■
Creating an SA Manually
■
Creating an SA in IKE Negotiation Mode
■
Encrypting, Decrypting, and Authenticating NDEC Cards
Creating an SA Manually
Establish a security tunnel between Router-A and Router-B to perform security
protection for the data streams between PC-A represented subnet (10.1.1.x) and
PC-B represented subnet (10.1.2.x). The security protocol adopts ESP protocol,
algorithm adopts DES, and authentication algorithm adopts sha1-hmac-96.
Operation
Command
Display the detailed information of crypto
cards (applicable to crypto cards)
display encrypt-card details [
slot-id
]
Display all established Security Association
on crypto card (applicable to crypto card)
display encrypt-card ipsec sa all [
slot-id ]
Display a specified Security Association on
crypto card (applicable to crypto card)
display encrypt-card ipsec sa
parameters
remote-address protocol
spi-number
Display statistical information of the
security packets processing on crypto card
(applicable to crypto card)
display encrypt-card statistic [
slot-id ]
Display current operating status of crypto
card (applicable to crypto card)
display encrypt-card status [ slot-id
]
Display current operating logging of
crypto card (applicable to crypto card)
display encrypt-card syslog [
slot-id
]
Display version number of crypto card
(applicable to crypto card)
display encrypt-card version [
slot-id ]
Delete all established Security Association
(applicable to crypto card)
reset encrypt-card sa all [ slot-id ]
Delete the specified Security Association
on crypto card (applicable to crypto card)
reset encrypt-card sa parameters
remote-address
protocol
spi-number
Clear the statistical information of security
packets on crypto card (applicable to
crypto card)
reset encrypt-card statistic [
slot-id ]
Clear all the logging information on the
crypto card (applicable to crypto cards)
reset encrypt-card syslog [
slot-id
]
Enable the debugging of information,
packets, SA, command, error and other
information (applicable to crypto cards)
debugging encrypt-card
{
all | packet
| sa | command | error | misc } [
slot-id
]
Enable the debugging of the main
software on the crypto card (applicable to
crypto cards)
debugging encrypt-card host
{
all |
packet | sa | command | error | misc
}
Summary of Contents for Router 3032
Page 1: ...http www 3com com 3Com Router Configuration Guide Published March 2004 Part No 10014299...
Page 4: ...VPN 615 RELIABILITY 665 QOS 681 DIAL UP 721...
Page 6: ...2 ABOUT THIS GUIDE...
Page 7: ...I GETTING STARTED Chapter 1 3Com Router Introduction Chapter 2 3Com Router User Interface...
Page 8: ...4...
Page 16: ...12 CHAPTER 1 3COM ROUTER INTRODUCTION...
Page 34: ...30...
Page 60: ...56 CHAPTER 3 SYSTEM MANAGEMENT...
Page 98: ...94 CHAPTER 6 DISPLAY AND DEBUGGING TOOLS...
Page 110: ...106...
Page 114: ...110 CHAPTER 8 INTERFACE CONFIGURATION OVERVIEW...
Page 158: ...154 CHAPTER 10 CONFIGURING WAN INTERFACE...
Page 168: ...164...
Page 188: ...184 CHAPTER 13 CONFIGURING PPPOE CLIENT...
Page 192: ...188 CHAPTER 14 CONFIGURING SLIP Router ip route static 0 0 0 0 0 0 0 0 10 110 0 1...
Page 248: ...244 CHAPTER 16 CONFIGURING LAPB AND X 25...
Page 320: ...316...
Page 330: ...326 CHAPTER 20 CONFIGURING IP ADDRESS...
Page 362: ...358 CHAPTER 21 CONFIGURING IP APPLICATION...
Page 374: ...370 CHAPTER 23 CONFIGURING IP COUNT...
Page 406: ...402 CHAPTER 25 CONFIGURING DLSW...
Page 408: ...404...
Page 452: ...448 CHAPTER 29 CONFIGURING OSPF...
Page 482: ...478 CHAPTER 30 CONFIGURING BGP...
Page 494: ...490 CHAPTER 31 CONFIGURING IP ROUTING POLICY...
Page 502: ...498...
Page 508: ...504 CHAPTER 33 IP MULTICAST...
Page 514: ...510 CHAPTER 34 CONFIGURING IGMP...
Page 526: ...522 CHAPTER 36 CONFIGURING PIM SM...
Page 528: ...524...
Page 532: ...528 CHAPTER 37 CONFIGURING TERMINAL ACCESS SECURITY...
Page 550: ...546 CHAPTER 38 CONFIGURING AAA AND RADIUS PROTOCOL...
Page 590: ...586 CHAPTER 40 CONFIGURING IPSEC...
Page 599: ...IX VPN Chapter 42 Configuring VPN Chapter 43 Configuring L2TP Chapter 44 Configuring GRE...
Page 600: ...596...
Page 638: ...634 CHAPTER 43 CONFIGURING L2TP...
Page 649: ...X RELIABILITY Chapter 45 Configuring a Standby Center Chapter 46 Configuring VRRP...
Page 650: ...646...
Page 666: ...662...
Page 670: ...666 CHAPTER 47 QOS OVERVIEW...
Page 700: ...696 CHAPTER 49 CONGESTION MANAGEMENT...
Page 706: ...702 CHAPTER 50 CONGESTION AVOIDANCE...
Page 707: ...XII DIAL UP Chapter 51 Configuring DCC Chapter 52 Configuring Modem...
Page 708: ...704...
Page 762: ...758 CHAPTER 52 CONFIGURING MODEM...