List of Tables

Table 1: Notice Icons
Table 2: Text and Syntax Conventions
Table 3: Match and Set Policy Values
Table 4: Action Based on Well-Known Community Membership
Table 5: Supported Regular Expression Metacharacters
Table 6: Sample Regular Expressions
Table 7: Determining BFD Versions
Table 8: IPsec Terms and Abbreviations
Table 9: Security Parameters Used on Secure IP Interfaces
Table 10: Security Parameters per IPsec Policy Type
Table 11: Supported Transforms
Table 12: Supported Security Transform Combinations
Table 13: Initiator Proposals and Policy Rules
Table 14: show ipsec tunnel profile Output Fields
Table 15: show subscribers Output Fields
Table 16: l2c oam Fields
Table 17: show l2c Output Fields
Table 18: show l2c discovery-table Output Fields
Table 19: show adjustment-factor Output Fields
Table 20: show l2c label Output Fields
Table 21: show l2c neighbor Output Fields
Table 22: show l2c statistics Output Fields
Table 23: Digital Certificate Terms and Acronyms
Table 24: Outcome of IKE Phase 1 Negotiations
Table 25: File Extensions (Offline Configuration)
Table 26: show dvmrp destination profile Output Fields
Table 27: show dvmrp tunnel Output Fields
Table 28: show gre destination profile Output Fields
Table 29: show gre tunnel Output Fields
Table 30: Configuration and Monitoring Tasks for NAT-T
Table 31: Differences in Handling Timeout Periods for L2TP/IPsec Tunnels