List of Tables

Table 1: Notice Icons
Table 2: Text and Syntax Conventions
Table 3: Match and Set Policy Values
Table 4: Action Based on Well-Known Community Membership
Table 5: Supported Regular Expression Metacharacters
Table 6: Sample Regular Expressions
Table 7: Determining BFD Versions
Table 8: IPSec Terms and Abbreviations
Table 9: Security Parameters Used on Secure IP Interfaces
Table 10: Security Parameters per IPSec Policy Type
Table 11: Supported Transforms
Table 12: Supported Security Transform Combinations
Table 13: Initiator Proposals and Policy Rules
Table 14: Digital Certificate Terms and Acronyms
Table 15: Outcome of IKE Phase 1 Negotiations
Table 16: File Extensions (Offline Configuration)
Table 17: Configuration and Monitoring Tasks for NAT-T
Table 18: Differences in Handling Timeout Periods for L2TP/IPSec Tunnels