A
- AAA
- access lists, IP
- access-list command 1, 2, 3
- adjustment-factor command
- aggregation flow caches 1
- ANCP (Access Node Control Protocol)
- adjusting downstream rates 1, 2, 3
- monitoring
- overview
- ANCP commands
- clear l2c neighbor 1, 2
- id
- l2c 1, 2, 3, 4
- l2c end-user-id
- l2c max-branches
- l2c peer-attachment-id
- max-branches
- neighbor
- qos-adaptive-mode 1, 2, 3
- session-timeout 1, 2, 3, 4
- authentication
- authentication commands
B
- baseline commands
- baseline ip
- baseline ip mobile home-agent 1, 2
- baseline ip tunnel-reassembly
- baseline, setting
- Mobile IP home agent 1, 2
- tunnel reassembly
- BFD (Bidirectional Forwarding Detection)
- BFD commands
- BGP (Border Gateway Protocol)
- Bidirectional Forwarding Detection. See BFD
C
- cache flow, IP
- certificate revocation list. See CRL
- checksum computation
- clear commands
- clear ip commands
- community lists, BGP
- conventions
- CRL (certificate revocation list) 1
- customer support 1
D
- dead peer detection. See DPD
- default-information originate command
- destruct timeout period for single-shot tunnels
- digital certificates
- authenticating the peer
- base64
- CA hierarchy
- certificate chains
- checking CRLs
- configuring
- file extensions
- generating private/public key pairs
- monitoring
- obtaining a public key certificate
- obtaining a root CA certificate
- obtaining public keys without 1, 2
- offline configuration
- offline enrollment
- online configuration
- online enrollment
- overview
- signature authentication
- standards
- viewing 1, 2, 3, 4
- X.509v3
- documentation set
- DPD (dead peer detection)
- DVMRP (Distance Vector Multicast Routing Protocol)
- DVMRP with IPsec
- dynamic IP tunnels
- dynamic tunnels
E
- enable commands
- endpoints, tunnel
F
- filter lists, BGP
- filtering
- flow statistics commands
- FQDN (fully qualified domain name) 1, 2, 3
- fully qualified domain name. See FQDN
G
- GRE (Generic Routing Encapsulation)
- GRE with IPsec
H
- home agent, Mobile IP. See Mobile IP home agent
I
- idle timeout period for single-shot tunnels
- IKE (Internet Key Exchange)
- aggressive mode characteristics
- aggressive mode negotiations
- authentication without digital certificates 1, 2
- initiator proposals and policy rules
- main mode characteristics
- overview
- SA negotiation
- using digital certificates
- IKE commands 1
- IKE message notification type
- IKE policies 1
- authentication mode
- Diffie-Hellman group
- encryption algorithms
- hash function
- IPsec tunnels
- lifetime
- priority
- instance, route map
- interface commands
- interface null
- interface tunnel 1, 2
- interfaces
- Internet Key Exchange. See IKE
- invalid cookies, IPsec
- IP
- ip commands
- IP flow
- IP fragmentation
- ip mobile commands
- ip nat commands 1, See also show ip nat commands
- IP reassembly of tunnel packets 1
- IP security policies
- IP tunnels 1, 2
- IP-in-IP tunnels 1, 2
- IPsec (IP Security) 1, 2, See also L2TP with IPsec
- AH
- AH processing
- concepts
- configuration
- configuring
- digital certificates
- encapsulation modes
- encapsulation protocols
- ESP
- ESP processing
- invalid cookies
- L2TP with IPsec 1, 2
- license
- monitoring
- overview
- packet encapsulation
- protocol stack
- reassembly of tunnel packets
- remote access 1, 2
- secure IP interfaces
- security parameters
- security parameters per policy type
- tunnel destination endpoint
- tunnel failover 1, 2
- tunnel source endpoint
- IPsec CA identity commands
- ipsec certificate commands
- ipsec commands 1, See also show ipsec commands
- ipsec ca authenticate
- ipsec ca enroll
- ipsec ca identity
- ipsec clear
- ipsec crl 1, 2
- ipsec identity
- ipsec ike-policy-rule
- ipsec isakmp-policy-rule
- ipsec key generate 1, 2, 3
- ipsec key manual pre-share
- ipsec key pubkey-chain rsa
- ipsec key zeroize 1, 2
- ipsec lifetime
- ipsec local-endpoint
- ipsec option dpd
- ipsec option tx-invalid-cookie
- ipsec transform-set
- key
- masked-key
- IPsec identity commands
- IPsec IKE policy commands
- IPsec security parameters
- in relation to IPsec interface
- inbound SAs 1, 2
- lifetime
- lifetime for user SAs
- manual versus signaled
- negotiating transforms
- operational VR
- outbound SAs 1, 2
- per IPsec policy type
- perfect forward secrecy (PFS) 1, 2
- transform combinations supported
- transform sets 1, 2
- transforms supported
- transport VR 1, 2
- IPsec transport local profile commands
- IPsec transport profile commands 1, See also show ipsec transport commands
- IPsec tunnel profile commands
- IPsec tunnel profiles
- IPv6
J
K
- keepalive messages, NAT-T
- key-string command
- keys, public
- displaying on router
- format of
- obtaining without digital certificates 1, 2
L
- L2C (Layer 2 Control) See ANCP (Access Node Control Protocol)
- L2F, reassembly of tunnel packets
- L2TP (Layer 2 Tunneling Protocol)
- l2tp commands
- l2tp destination profile 1, 2
- l2tp ignore-receive-data-sequencing
- L2TP RWS (receive window size)
- L2TP with IPsec 1, 2
- client software supported
- compatibility
- configuring
- client PC
- E Series router 1, 2
- IPsec transport profiles
- L2TP destination profiles 1, 2
- single-shot tunnels
- control and data frames
- group preshared key
- how it works
- LNS change of port
- monitoring
- NAT interactions
- overview 1, 2
- references
- requirements
- setting up secure connection
- tunnel creation
- with PPP
- license commands
- lifetime, IPsec 1, 2
- limiting translation entries
- loopback interfaces 1, 2
M
- manual IPsec interfaces
- manuals
- map tag, route map
- match commands 1
- max-interfaces command 1, 2
- Mobile IP home agent
- AAA
- agent discovery
- authentication
- clearing the binding details from binding table
- configuration prerequisites
- configuring
- home address assignment
- licensing
- monitoring
- monitoring the binding table information
- monitoring the configuration information
- monitoring the configuration of all or specified mobile nodes or domain users
- monitoring the interface profile name
- monitoring the license key
- monitoring the protocol statistics
- monitoring the security associations configured for all foreign agents
- monitoring the security associations configured on all mobile node hosts
- overview
- platform considerations
- references
- registration
- routing and forwarding
- security associations
- subscriber management
- MTU (maximum transmission unit)
N
- NAT (Network Address Translation)
- access list rules, creating
- address pools, defining
- address translation
- bidirectional
- configuration examples
- configuration types
- configuring
- dynamic address translation, defining
- dynamic inside source translation, creating
- dynamic outside source translation, creating
- interfaces, specifying inside and outside
- license
- monitoring
- NAT-T
- overview
- passthrough mode
- references
- static address translation, defining
- terms 1
- timeouts, defining
- translation entries, limiting
- translation rules, defining
- translations, clearing
- NAT-T (Network Address Translation Traversal)
- neighbor commands
- Network Address Translation Traversal. See NAT-T
- Network Address Translation. See NAT
- next-hop routers
- notice icons
- null interface
O
- OSPF (Open Shortest Path First)
P
- peer public keys
- displaying on router
- obtaining without digital certificates 1, 2
- perfect forward secrecy
- platform considerations
- preventing recursive tunnels
- public keys
- displaying on router
- format of
- obtaining without digital certificates 1, 2
Q
R
- recursive tunnels, preventing
- redistribute command
- redistribution policy (IP), monitoring 1, 2
- redundancy 1
- RIP (Routing Information Protocol)
- route maps
- routing policy
- routing policy, BGP
- routing table
- routing, IP 1, See also IP
S
- secure IP interfaces
- security parameters
- sequence number, route map
- Service Modules. See SMs
- set commands 1
- shared tunnel-server ports 1, 2, 3, 4, 5, 6
- show access-list command 1, 2
- show adjustment-factor command
- show bfd session command
- show dvmrp commands
- show gre commands
- show ike commands
- show ike policy-rule
- show ike sa 1, 2
- show ip commands
- show ip flow sampling command 1, 2
- show ip mobile commands
- show ip nat commands
- show ip nat inside rule
- show ip nat outside rule
- show ip nat statistics
- show ip nat translations 1, 2
- show ipsec commands
- show ike certificates
- show ike configuration
- show ike identity
- show ipsec ca identity
- show ipsec certificates
- show ipsec identity 1, 2
- show ipsec ike-configuration
- show ipsec ike-policy-rule
- show ipsec ike-sa 1, 2
- show ipsec key mypubkey rsa
- show ipsec key pubkey-chain rsa
- show ipsec lifetime
- show ipsec local-endpoint
- show ipsec option 1, 2
- show ipsec transform-set
- show ipsec tunnel detail
- show ipsec tunnel summary
- show ipsec tunnel virtual-router
- show license ipsec-tunnels
- show ipsec transport commands
- show ipv6 commands
- show l2c commands
- show l2c
- show l2c label
- show l2c neighbor
- show l2c statistics 1, 2
- show route-map command
- single-shot tunnels
- SMs (Service modules)
- source, tunnel
- static routes 1
- static tunnels
- statistics, tunnel reassembly
- subscriber management
- support, technical See technical support
T
- table-map command
- technical support
- text and syntax conventions
- timeout periods for single-shot tunnels
- transform sets, IPsec
- transport network
- tunnel commands, IP
- tunnel commands, IPsec
- tunnel-server ports
- tunnels, IP
- tunnels, IPsec monitoring
- tunnels, single-shot
U
- UDP (User Datagram Protocol)
- updates, BGP
X