Zyxel Keenetic Start II Справочник командного интерфейса онлайн [8/256] 153785

Zyxel Keenetic Start II Справочник командного интерфейса онлайн [8/256] 153785
3.6.5 components remove ........................................................................................... 37
3.6.6 components sync ............................................................................................... 38
3.6.7 components validity-period ................................................................................ 38
3.7 crypto ike key ................................................................................................................ 39
3.8 crypto ike nat-keepalive ................................................................................................. 40
3.9 crypto ike policy ............................................................................................................ 40
3.9.1 crypto ike policy lifetime ..................................................................................... 41
3.9.2 crypto ike policy mode ........................................................................................ 41
3.9.3 crypto ike policy negotiation-mode ..................................................................... 42
3.9.4 crypto ike policy proposal ................................................................................... 43
3.10 crypto ike proposal ...................................................................................................... 43
3.10.1 crypto ike proposal dh-group ............................................................................ 44
3.10.2 crypto ike proposal encryption ......................................................................... 45
3.10.3 crypto ike proposal integrity ............................................................................. 46
3.11 crypto ipsec transform-set ........................................................................................... 46
3.11.1 crypto ipsec transform-set cypher .................................................................... 47
3.11.2 crypto ipsec transform-set dh-group ................................................................. 48
3.11.3 crypto ipsec transform-set hmac ....................................................................... 48
3.11.4 crypto ipsec transform-set lifetime .................................................................... 49
3.12 crypto ipsec profile ...................................................................................................... 50
3.12.1 crypto ipsec profile authentication-local ........................................................... 50
3.12.2 crypto ipsec profile authentication-remote ....................................................... 51
3.12.3 crypto ipsec profile dpd-interval ....................................................................... 52
3.12.4 crypto ipsec profile identity-local ...................................................................... 52
3.12.5 crypto ipsec profile match-identity-remote ....................................................... 53
3.12.6 crypto ipsec profile mode ................................................................................. 54
3.12.7 crypto ipsec profile policy ................................................................................. 54
3.12.8 crypto ipsec profile preshared-key .................................................................... 55
3.12.9 crypto ipsec profile xauth ................................................................................. 55
3.12.10 crypto ipsec profile xauth-identity ................................................................... 56
3.12.11 crypto ipsec profile xauth-password ............................................................... 57
3.13 crypto map ................................................................................................................... 57
3.13.1 crypto map connect .......................................................................................... 58
3.13.2 crypto map enable ............................................................................................ 58
3.13.3 crypto map fallback-check-interval ................................................................... 59
3.13.4 crypto map match-address ............................................................................... 60
3.13.5 crypto map nail-up ............................................................................................ 60
3.13.6 crypto map set-peer .......................................................................................... 61
3.13.7 crypto map set-peer-fallback ............................................................................. 61
3.13.8 crypto map set-profile ....................................................................................... 62
3.13.9 crypto map set-tcpmss ..................................................................................... 62
3.13.10 crypto map set-transform ................................................................................ 63
3.14 dpi shaping .................................................................................................................. 64
Keenetic Start II Справочник команд
8
Содержание

Содержание

Похожие устройства