EasyManua.ls Logo

Cisco CRS User Manual

Cisco CRS
304 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #145 background imageLoading...
Page #145 background image
Usage Guidelines
If no optional argument or keyword is used, all SAs are displayed within a flow. Within a flow, the SAs are
listed by protocol (Encapsulating Security Payload [ESP] or Authentication Header [AH]) and direction
(inbound or outbound).
The detail keyword provides additional information only for SAs that are configured in a software crypto
engine. The SAs are configured by using tunnel-ipsec and transport.
Task ID
OperationsTask ID
readcrypto
Examples
The following sample output is from the show crypto ipsec sa command:
RP/0/RP0/CPU0:router# show crypto ipsec sa
SSA id: 510
Node id: 0/1/0
SA Type: MANUAL
interface: service-ipsec22
profile : p7
local ident (addr/mask/prot/port) : (0.0.0.0/0.0.0.255/512/0)
remote ident (addr/mask/prot/port) : (0.0.0.0/0.0.0.0/512/0)
local crypto endpt: 0.0.0.0, remote crypto endpt: 0.0.0.0, vrf default
#pkts tx :0 #pkts rx :0
#bytes tx :0 #bytes rx :0
#pkts encrypt :0 #pkts decrypt :0
#pkts digest :0 #pkts verify :0
#pkts encrpt fail:0 #pkts decrpt fail:0
#pkts digest fail:0 #pkts verify fail:0
#pkts replay fail:0
#pkts tx errors :0 #pkts rx errors :0
outbound esp sas:
spi: 0x322(802)
transform: esp-3des-md5
in use settings = Tunnel
sa agreed lifetime: 3600s, 4194303kb
sa timing: remaining key lifetime: 3142303931sec/0kb
sa DPD: disable, mode none, timeout 0s
sa idle timeout: disable, 0s
sa anti-replay (HW accel): enable, window 64
inbound esp sas:
spi: 0x322(802)
transform: esp-3des-md5
in use settings = Tunnel
sa agreed lifetime: 3600s, 4194303kb
sa timing: remaining key lifetime: 3142303931sec/0kb
sa DPD: disable, mode none, timeout 0s
sa idle timeout: disable, 0s
sa anti-replay (HW accel): enable, window 64
This table describes the significant fields shown in the display.
Cisco IOS XR System Security Command Reference for the Cisco CRS Router, Release 4.1
OL-24740-01 135
IPSec Commands
show crypto ipsec sa

Table of Contents

Other manuals for Cisco CRS

Question and Answer IconNeed help?

Do you have a question about the Cisco CRS and is the answer not in the manual?

Cisco CRS Specifications

General IconGeneral
Operating SystemCisco IOS XR
Product TypeCore Router
Form FactorModular Chassis
DimensionsVaries by chassis type
WeightVaries by chassis type
ArchitectureDistributed
Switch FabricMulti-stage
Interface SupportEthernet, SONET/SDH, OTN
Interfaces/PortsVaries by line card
Port DensityVaries by line card
Routing ProtocolBGP, IS-IS, OSPF, MPLS
ManagementCLI, SNMP
Power SupplyRedundant, hot-swappable
CoolingRedundant, Hot-swappable Fan Trays
Supported ProtocolsIPv4, IPv6, MPLS
Management InterfacesEthernet, console
Security FeaturesACLs

Summary

Preface

Document Change History

Lists technical changes made to the document since its initial release.

Documentation and Service Request Procedures

Provides information on obtaining documentation and submitting service requests.

Authentication, Authorization, and Accounting Commands

AAA Accounting Configuration

Configures AAA accounting methods for commands, EXEC sessions, network services, or system events.

AAA Authentication Configuration

Configures AAA authentication method lists for login, PPP, or subscriber authentication.

AAA Authorization Configuration

Configures AAA authorization method lists for commands, EXEC sessions, network services, or subscribers.

RADIUS Server Key Configuration

Specifies the authentication and encryption key for RADIUS communications between router and daemon.

TACACS+ Server Host Configuration

Specifies a TACACS+ host server, including its name or IP address and port.

IPSec Commands

Clear IPSec Security Associations

Deletes specific or all IPSec security associations (SAs) from the SADB or clears counters/interfaces.

Show IPSec SA Information

Displays security association (SA) information based on rack/slot/module location, peer, profile, or count.

Configure IPSec Tunnel Encapsulation

Sets the encapsulation mode for a tunnel interface, specifying GRE or IPv4.

Keychain Management Commands

Keychain Key Configuration

Creates or modifies a keychain key, specifying a 48-bit integer key identifier.

Keychain Management

Creates or modifies a keychain, specifying its name and maximum character limit.

Show Keychain Status

Displays the keychain status, including keys, tolerance, lifetimes, and cryptographic algorithm.

Lawful Intercept Commands

Disable Lawful Intercept Feature

Disables the Lawful Intercept (LI) feature, which also deletes associated Mediation Devices and TAPs.

Management Plane Protection Commands

Configure Management Traffic IP Address

Configures peer IPv4 or IPv6 addresses for management traffic allowed on an interface.

Allow Management Traffic Protocols

Configures an interface to allow peer-filtering for specified management protocols or all protocols.

Configure Management Plane Protection

Configures management plane protection to allow and disallow protocols.

Configure Out-of-Band Management

Configures out-of-band interfaces or protocols and enters management plane protection out-of-band configuration mode.

Public Key Infrastructure Commands

Authenticate Certificate Authority

Authenticates the CA to the router by obtaining the CA's certificate and verifying its fingerprint.

Configure Trusted Certificate Authority

Declares a CA and configures a trusted point for verifying peer certificates.

Generate RSA Key Pair

Generates Rivest, Shamir, and Adelman (RSA) key pairs for signing and encryption.

Software Authentication Manager Commands

Add Certificate to SAM Table

Adds a new certificate to the SAM certificate table, with or without validation.

Show SAM Certificate Information

Displays records in the SAM certificate table, including location, index, and flag.

Show SAM System Information

Displays current configuration settings, status, prompt interval, and default response for SAM.

Secure Shell Commands

Start SSH Client Connection

Starts an SSH client connection and enables an outbound connection to an SSH server.

Configure SSH Server

Enables the SSH server, configures VRFs for its use, and sets the server version to SSHv2.

Authenticate SSH Server Public Key

Authenticates a server public key (pubkey) by storing it in the client's local database.

Secure Socket Layer Protocol Commands

Show Active SSL Sessions

Displays active Secure Socket Layer (SSL) sessions, showing PID, Method, Type, Peer, Port, and Cipher-Suite.

Related product manuals