Configuring Ike Policies - Cisco IOS XR Configuration Manual

System security configuration guide
Hide thumbs Also See for IOS XR:
Table of Contents

Advertisement

How to Implement IKE Security Protocol Configurations for IPSec Networks
Command or Action
Step 3
no crypto isakmp
Example:
RP/0/RP0/CPU0:router(config)# no crypto isakmp
Step 4
end
or
commit
Example:
RP/0/RP0/CPU0:router(config)# end
or
RP/0/RP0/CPU0:router(config)# commit

Configuring IKE Policies

This task configures IKE policies.
SUMMARY STEPS
1.
2.
3.
4.
5.
6.
7.
8.
9.
Cisco IOS XR System Security Configuration Guide
SC-34
configure
crypto isakmp policy priority
encryption {des | 3des | aes | aes 192 | aes 256}
hash {sha | md5}
authentication {pre-share | rsa-sig | rsa-encr}
group {1 | 2 | 5}
lifetime seconds
end
or
commit
show crypto isakmp policy
Implementing Internet Key Exchange Security Protocol on Cisco IOS XR Software
Purpose
(Optional) Disables IKE at the peer router.
Saves configuration changes.
When you issue the end command, the system prompts
you to commit changes:
Uncommitted changes found, commit them before
exiting(yes/no/cancel)?
[cancel]:
Entering yes saves configuration changes to the
running configuration file, exits the configuration
session, and returns the router to EXEC mode.
Entering no exits the configuration session and
returns the router to EXEC mode without
committing the configuration changes.
Entering cancel leaves the router in the current
configuration session without exiting or
committing the configuration changes.
Use the commit command to save the configuration
changes to the running configuration file and remain
within the configuration session.

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Ios xr 3.5

Table of Contents