Cisco CSS11501S-C-K9 Configuration Manual page 356

Secure content accelerator
Table of Contents

Advertisement

Configuration Command Set
Cryptographic Scheme
DES-CBC3-SHA
DES-CBC-MD5
DES-CBC-SHA
EXP-ARC2-MD5
EXP-ARC4-MD5
EXP-DES-CBC-SHA
EXP1024-ARC2-CBC-MD5
EXP1024-ARC4-MD5
EXP1024-ARC4-SHA
EXP1024-DES-CBC-SHA
NULL-MD5
NULL-SHA
1 ARC4 is compatible with RC4™ RSA Data Security.
2 ARC2 is compatible with RC2™ RSA Data Security.
Usage Guidelines
Cisco 11000 Series Secure Content Accelerator Configuration Guide
C-162
Encryption
3DES (168)
DES (56)
DES (56)
2
ARC2
(40)
1
ARC4
(40)
DES (40)
2
ARC2
(40)
1
ARC4
(40)
1
ARC4
(40)
DES (56)
None
None
Availability: Serial, Telnet; FIPS Mode (serial only)
(This command must be entered on one line.) You can identify either individual
ciphers or use the fips, noexpor56, strong, weak, default, or all keywords to
specify cipher sets.
The no form of this command is used to remove a cipher or set of ciphers. You
must specify which algorithm(s) to remove following the no crypto command.
For example, using the commands crypto ARC4-MD5 and crypto ARC4-SHA
loads both schemes into the current user-defined security policy. Additionally, you
can alter the preset cryptography schemes specified for the current security policy.
If you enter crypto weak and no crypto NULL-MD5 commands, the
NULL-MD5 cryptography scheme is removed from the current security policy.
Message
Key
Authentication
Exchange
SHA1
RSA (1024)
MD5
RSA (1024)
SHA1
RSA (1024)
MD5
RSA (512)
MD5
RSA (512)
SHA1
RSA (512)
MD5
RSA (1024)
MD5
RSA (1024)
SHA1
RSA (1024)
SHA1
RSA (1024)
MD5
None
SHA1
None
Appendix C
Command Summary
Security
Policy
Assignments
fips, strong, all
strong, all
fips, strong, all
weak, all
weak, default, all
weak, all
weak, default, all
weak, default, all
weak, default, all
weak, all
weak, default, all
weak, default, all
78-13124-06

Advertisement

Table of Contents
loading

This manual is also suitable for:

Css-11154-ac11000 series

Table of Contents