alg
algorithm
Identifies the encryption method.
Related Commands
certificate
,
idcred
,
send file
,
sign
(Crypto)
Examples
v
Encrypts the
FWSec-1
log file with the recipient certificate that is referenced by
the
bob
alias.
# encrypt
logtemp:///FWSec-1 cert bob alg smime
File 'FWSec-1' successfully encoded
#
fwcred
Enters Firewall Credentials configuration mode.
Syntax
fwcred
name
no fwcred
name
Parameters
name
Specifies the name of the Firewall Credentials.
The name can contain a maximum of 32 characters. For restrictions, refer to
“Object name conventions” on page xxiv.
Guidelines
While in Firewall Credentials configuration mode, use the
key
and
sskey
commands to add specified keys to the Firewall Credentials, and use the
certificate
command to add specified certificates to the list.
A Firewall Credentials can be assigned to DataPower services. The Firewall
Credentials provides a means to specify which keys and certificates are permitted
with various cryptographic extension functions in support of service-specific
security activities.
In the absence of a Firewall Credentials, all keys and certificates that are available
on the DataPower appliance can support firewall activities.
Use the
no fwcred
command to delete a Firewall Credentials.
Related Commands
certificate
,
key
,
sskey
Examples
v
Enters Firewall Credentials configuration mode to create the
FWCred-1
Firewall
Credentials.
# fwcred FWCred-1
Entering Firewall Credentials mode for 'FWCred-1'
#
220
Command Reference
Summary of Contents for WebSphere XS40
Page 1: ...WebSphere DataPower XML Security Gateway XS40 Command Reference Version 3 7 2 ...
Page 2: ......
Page 3: ...WebSphere DataPower XML Security Gateway XS40 Command Reference Version 3 7 2 ...
Page 44: ...18 Command Reference ...
Page 194: ...168 Command Reference ...
Page 198: ...172 Command Reference ...
Page 206: ...180 Command Reference ...
Page 210: ...184 Command Reference ...
Page 222: ...196 Command Reference ...
Page 232: ...206 Command Reference ...
Page 238: ...212 Command Reference ...
Page 268: ...242 Command Reference ...
Page 272: ...246 Command Reference ...
Page 276: ...250 Command Reference ...
Page 288: ...262 Command Reference ...
Page 292: ...266 Command Reference ...
Page 298: ...272 Command Reference ...
Page 320: ...294 Command Reference ...
Page 322: ...296 Command Reference ...
Page 340: ...314 Command Reference ...
Page 344: ...318 Command Reference ...
Page 352: ...326 Command Reference ...
Page 360: ...334 Command Reference ...
Page 368: ...342 Command Reference ...
Page 376: ...350 Command Reference ...
Page 386: ...360 Command Reference ...
Page 392: ...366 Command Reference ...
Page 396: ...370 Command Reference ...
Page 402: ...376 Command Reference ...
Page 404: ...378 Command Reference ...
Page 408: ...382 Command Reference ...
Page 446: ...420 Command Reference ...
Page 450: ...424 Command Reference ...
Page 456: ...430 Command Reference ...
Page 520: ...494 Command Reference ...
Page 536: ...510 Command Reference ...
Page 550: ...524 Command Reference ...
Page 584: ...558 Command Reference ...
Page 600: ...574 Command Reference ...
Page 605: ... timeout 500 Chapter 63 RADIUS configuration mode 579 ...
Page 606: ...580 Command Reference ...
Page 650: ...624 Command Reference ...
Page 668: ...642 Command Reference ...
Page 704: ...678 Command Reference ...
Page 714: ...688 Command Reference ...
Page 726: ...700 Command Reference ...
Page 734: ...708 Command Reference ...
Page 752: ...726 Command Reference ...
Page 756: ...730 Command Reference ...
Page 804: ...778 Command Reference ...
Page 880: ...854 Command Reference ...
Page 892: ...866 Command Reference ...
Page 912: ...886 Command Reference ...
Page 918: ...892 Command Reference ...
Page 940: ...914 Command Reference ...
Page 946: ...920 Command Reference ...
Page 974: ...948 Command Reference ...
Page 1004: ...978 Command Reference ...
Page 1030: ...1004 Command Reference ...
Page 1032: ...1006 Command Reference ...
Page 1065: ......
Page 1066: ... Printed in USA ...