Implementing Internet Key Exchange Security Protocol on Cisco IOS XR Software
Command or Action
Step 3
end
or
commit
Example:
RP/0/RP0/CPU0:router(config)# end
or
RP/0/RP0/CPU0:router(config)# commit
Step 4
show cyrpto isakmp call admission statistics
Example:
RP/0/RP0/CPU0:router# show crypto isakmp call
admission statistics
Configuring the System Resource Limit
This task configures the system resource limit.
SUMMARY STEPS
1.
2.
3.
4.
OL-20382-01
configure
crypto isakmp call admission limit {cpu {total percent | ike percent}}
end
or
commit
show cyrpto isakmp call admission statistics
Cisco IOS XR System Security Configuration Guide for the Cisco CRS-1 Router
How to Implement IKE Security Protocol Configurations for IPSec Networks
Purpose
Saves configuration changes.
•
When you issue the end command, the system
prompts you to commit changes:
Uncommitted changes found, commit them
before exiting (yes/no/cancel)?
[cancel]:
–
Entering yes saves configuration changes to
the running configuration file, exits the
configuration session, and returns the
router to EXEC mode.
Entering no exits the configuration session
–
and returns the router to EXEC mode
without committing the configuration
changes.
–
Entering cancel leaves the router in the
current configuration session without
exiting or committing the configuration
changes.
Use the commit command to save the
•
configuration changes to the running
configuration file and remain within the
configuration session.
Monitors crypto CAC statistics.
SC-131