Adaptec iSA1500 User Guide - Page 175

ipseckey commands, dynamic name id id psk | rsa | x509, host name ip_host [id id] psk | rsa | x509

Page 175 highlights

Using CLI dynamic name id id psk | rsa | x509 policy_parameters Create a dynamic connection referred to by name. The connection is defined by the id value of the remote end. An ID can be an ip_numb, or any string, which is normally the remote host's name. Strictly, it should be preceded by an '@' although this will be added if it is not supplied. No attempt is made to resolve the IP address if an ip_numb is not supplied. host name ip_host [id id] psk | rsa | x509 policy_parameters Create a host connection referred to by name. The connection is defined by the remote end-point given by the ip_host parameter. This must be accessible from this unit. If the optional id parameter is omitted, its value is taken to be the IP number of the remote host. network name ip_host ip_mask [id id] psk | rsa | x509 policy_parameters Create a network connection referred to by name. The connection is defined by the remote end-point given by the ip_host parameter plus the remote subnet behind it defined by the ip_mask parameter. The end-point must be accessible from the unit but the remote subnet need only be accessible from the end-point. Typically the end-point is a public IP address and the subnet is a set of private (or nonroutable) IP addresses. opportunistic [rsa] rsa_parameters Create an opportunistic connection. It may only take an RSA policy so the rsa switch is optional. The unit may only have a single opportunistic connection so this command will overwrite any existing opportunistic connection. ipsec key commands These commands manipulate the IPSec keys for this unit. These commands are available after the ipsec key command. They can also be run as global commands by preceding them by ipsec key or by preceding them with key from the ipsec context. 8-36

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218

8-36
Using CLI
dynamic name id id psk | rsa | x509
policy_parameters
Create a dynamic connection referred to by
name
. The connection
is defined by the
id
value of the remote end. An ID can be an
ip_numb
, or any string, which is normally the remote host's name.
Strictly, it should be preceded by an '
@
' although this will be added
if it is not supplied. No attempt is made to resolve the IP address if
an
ip_numb
is not supplied.
host name ip_host [id id] psk | rsa | x509
policy_parameters
Create a host connection referred to by
name
. The connection is
defined by the remote end-point given by the
ip_host
parameter.
This must be accessible from this unit. If the optional
id
parameter
is omitted, its value is taken to be the IP number of the remote host.
network name ip_host ip_mask [id id] psk | rsa | x509
policy_parameters
Create a network connection referred to by
name
. The connection is
defined by the remote end-point given by the
ip_host
parameter
plus the remote subnet behind it defined by the
ip_mask
parameter. The end-point must be accessible from the unit but the
remote subnet need only be accessible from the end-point.
Typically the end-point is a public IP address and the subnet is a set
of private (or nonroutable) IP addresses.
opportunistic [rsa]
rsa_parameters
Create an opportunistic connection.
It may only take an RSA policy so the
rsa
switch is optional.
The unit may only have a single opportunistic connection so this
command will overwrite any existing opportunistic connection.
ipsec key commands
These commands manipulate the IPSec keys for this unit. These
commands are available after the
ipsec key
command. They can
also be run as global commands by preceding them by
ipsec key
or by preceding them with
key
from the
ipsec
context.