Command Reference Guide
3Com Router 3000 Ethernet Family
Command Reference Guide
Table of Contents
3Com Corporation
iv
4.2.8 display aspf session .............................................................................................. 4-13
4.2.9 display port-mapping............................................................................................. 4-15
4.2.10 firewall aspf ......................................................................................................... 4-15
4.2.11 log enable............................................................................................................ 4-16
4.2.12 port-mapping ....................................................................................................... 4-17
Chapter 5 IPSec Configuration Commands................................................................................ 5-1
5.1 IPSec Configuration Commands ....................................................................................... 5-1
5.1.1 ah authentication-algorithm..................................................................................... 5-1
5.1.2 debugging ipsec ...................................................................................................... 5-2
5.1.3 display ipsec policy ................................................................................................. 5-2
5.1.4 display ipsec policy-template .................................................................................. 5-5
5.1.5 display ipsec proposal............................................................................................. 5-6
5.1.6 display ipsec sa....................................................................................................... 5-8
5.1.7 display ipsec statistics........................................................................................... 5-11
5.1.8 encapsulation-mode.............................................................................................. 5-12
5.1.9 esp authentication-algorithm................................................................................. 5-13
5.1.10 esp encryption-algorithm..................................................................................... 5-14
5.1.11 ipsec policy(in Interface View)............................................................................. 5-15
5.1.12 ipsec policy (in System View).............................................................................. 5-16
5.1.13 ipsec policy-template........................................................................................... 5-18
5.1.14 ipsec proposal ..................................................................................................... 5-19
5.1.15 ipsec sa global-duration ...................................................................................... 5-20
5.1.16 pfs........................................................................................................................ 5-21
5.1.17 proposal............................................................................................................... 5-22
5.1.18 reset ipsec sa ...................................................................................................... 5-23
5.1.19 reset ipsec statistics............................................................................................ 5-24
5.1.20 sa authentication-hex.......................................................................................... 5-25
5.1.21 sa duration........................................................................................................... 5-26
5.1.22 sa encryption-hex................................................................................................ 5-27
5.1.23 sa spi................................................................................................................... 5-29
5.1.24 sa string-key........................................................................................................ 5-30
5.1.25 security acl .......................................................................................................... 5-32
5.1.26 transform ............................................................................................................. 5-33
5.1.27 tunnel local .......................................................................................................... 5-34
5.1.28 tunnel remote ...................................................................................................... 5-35
5.2 Encryption Card Configuration Commands ..................................................................... 5-36
5.2.1 debugging encrypt-card ........................................................................................ 5-36
5.2.2 display encrypt-card fast-switch............................................................................ 5-37
5.2.3 display encrypt-card sa ......................................................................................... 5-38
5.2.4 display encrypt-card statistics ............................................................................... 5-39
5.2.5 display encrypt-card syslog................................................................................... 5-40
5.2.6 display interface encrypt ....................................................................................... 5-41










