Avaya G450 Cli Reference Manual page 1269

Hide thumbs Also See for G450:
Table of Contents

Advertisement

To display all crypto-lists:
G450-001(super)# show ip crypto-list
Index Description
----- ------------------------------- ---------
900
Default Crypto List
901
VPN_via-lease_Line
Output fields
Name
Index
Description
Status
Owner
Local Address
Rules
Index
Protocol
IP
Wildcard
Action
Crypto map
Applicable crypto
maps
ID
Description
The index of the crypto-list
The user-defined description of the crypto-list
Whether the crypto-list is valid or invalid.
A crypto-list is valid if and only if all the crypto maps it points to exist
and are valid. A crypto map is valid if and only if it is fully configured
with all the obligatory parameters, and points to a valid ISAKMP peer.
This field exists for legacy purposes, and is not currently relevant
The configured local address for the crypto-list. Can be either an IP
address or an interface name.
The table of ip-rules, as follows:
The index number of the ip-rule.
This field is reserved for future use
The source or destination IP address of the rule. For each rule, the
source IP is displayed first and the destination IP is displayed in the
next line.
The source or destination wildcard of the rule. For each rule, the
source wildcard is displayed first and the destination wildcard is
displayed in the next line.
Whether to protect traffic that matches the source and destination
addresses, or bypass protection
The ID of the crypto map specifying how to protect traffic
The table of crypto maps pointed to by this crypto-list, as follows:
Crypto map ID
Status
Owner
-----
valid
other
valid
other
indicates the default ip-rule.
Deflt
Issue 1 January 2008
VPN
1 of 2
1269

Advertisement

Table of Contents
loading

Table of Contents