Configuring Transform Sets - Cisco AP776A - Nexus Converged Network Switch 5020 Configuration Manual

Cisco mds 9000 family cli configuration guide - release 4.x (ol-18084-01, february 2009)
Hide thumbs Also See for AP776A - Nexus Converged Network Switch 5020:
Table of Contents

Advertisement

Crypto IPv4-ACLs
S e n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a c k - d o c @ c i s c o . c o m
Table 37-2
Table 37-2
Parameter
encryption algorithm
hash/authentication algorithm
(optional)
1. If you configure the AES counter (CTR) mode, you must also configure the authentication algorithm.
The following table lists the supported and verified settings for IPsec and IKE encryption authentication
algorithms on the Microsoft Windows and Linux platforms:
Platform
Microsoft iSCSI initiator,
Microsoft IPsec implementation
on Microsoft Windows 2000
platform
Cisco iSCSI initiator,
Free Swan IPsec implementation
on Linux platform

Configuring Transform Sets

To configure transform sets, follow these steps:
Command
Step 1
switch# config terminal
switch(config)#
Step 2
switch(config)# crypto transform-set
domain ipsec test esp-3des esp-md5-hmac
switch(config)# no crypto transform-set
domain ipsec test esp-3des esp-md5-hmac
switch(config)# crypto transform-set
domain ipsec test esp-3des
switch(config)# no crypto transform-set
domain ipsec test esp-3des
Cisco MDS 9000 Family CLI Configuration Guide
37-22
provides a list of allowed transform combinations for IPsec.
IPsec Transform Configuration Parameters
1
IKE
3DES, SHA-1 or MD5,
DH group 2
3DES, MD5, DH group 1
Chapter 37
Accepted Values
56-bit DES-CBC
168-bit DES
128-bit AES-CBC
1
128-bit AES-CTR
256-bit AES-CBC
1
256-bit AES-CTR
SHA-1 (HMAC variant)
MD5 (HMAC variant)
AES-XCBC-MAC
Purpose
Enters configuration mode.
Configures a transform set called test specifying the
3DES encryption algorithm and the MD5
authentication algorithm. Refer to
verify the allowed transform combinations.
Deletes the applied transform set.
Configures a transform set called test specifying the
3DES encryption algorithm. In this case, the default
no authentication is performed.
Deletes the applied transform set.
Configuring IPsec Network Security
Keyword
esp-des
esp-3des
esp-aes 128
esp-aes 128 ctr
esp-aes 256
esp-aes 256 ctr
esp-sha1-hmac
esp-md5-hmac
esp-aes-xcbc-mac
IPsec
3DES, SHA-1
3DES, MD5
Table 37-2
OL-18084-01, Cisco MDS NX-OS Release 4.x
to

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents