Adaptec iSA1500 User Guide - Page 179

port [local port] [remote port], sa [attempts true | count] [margin time] [fuzz time] [rekey boolean]

Page 179 highlights

Using CLI pfs boolean Whether to enable PFS. policy psk (local | key_host key_user [password password] key_location) policy rsa key_host key_user [password password] key_location policy x509 dn dist_name Define which authentication policy to use for this connection and get the key or certificate from a remote server. The actual format of the command depends on the type of policy selected. In all cases the key_host parameter is the host to access (FTP) to get the key or certificate and key_location the pathname of the file to get. Normally, the CLI will prompt for a password although it can be added on the command line with the password parameter. For the psk policy the unit's local PSK can be used rather than importing one from the remote end of the connection. For the x509 policy just the certificate's Distinguished Name is required. port [local port] [remote port] Define the ports on which the connection negotiations should occur. The local port defines the port to use for incoming connections and the remote port the port to use when connections are initiated by the unit. rename name Give the connection a new name. sa [attempts true | count] [margin time] [fuzz time] [rekey boolean] Set the values to do with the SA. At least one parameter must be supplied. The attempts parameter controls how many attempts will be made to establish the SA, with true meaning unlimited. The margin and fuzz parameters control when retries will occur. Both values are relative_period values. The rekey parameter determined whether rekeying will be attempted. 8-40

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218

8-40
Using CLI
pfs
boolean
Whether to enable PFS.
policy psk (local | key_host key_user [password password] key_location)
policy rsa key_host key_user [password password] key_location
policy x509 dn dist_name
Define which authentication policy to use for this connection and
get the key or certificate from a remote server. The actual format of
the command depends on the type of policy selected. In all cases
the
key_host
parameter is the host to access (FTP) to get the key
or certificate and
key_location
the pathname of the file to get.
Normally, the CLI will prompt for a password although it can be
added on the command line with the
password
parameter.
For the
psk
policy the unit's local PSK can be used rather than
importing one from the remote end of the connection.
For the
x509
policy just the certificate's Distinguished Name is
required.
port [local port] [remote port]
Define the ports on which the connection negotiations should
occur. The
local port
defines the port to use for incoming
connections and the
remote port
the port to use when
connections are initiated by the unit.
rename name
Give the connection a new name.
sa [attempts true | count] [margin time] [fuzz time] [rekey boolean]
Set the values to do with the SA. At least one parameter must be
supplied.
The
attempts
parameter controls how many attempts will be
made to establish the SA, with
true
meaning unlimited.
The
margin
and
fuzz
parameters control when retries will occur.
Both values are
relative_period
values.
The
rekey
parameter determined whether rekeying will be
attempted.