White Papers

Table Of Contents
Usage
Information
This command creates a crypto policy entry and enters the crypto policy configuration mode for
configuring the flow parameters.
Example
Dell(conf)#crypto ipsec policy West 10 ipsec-manual
Dell(conf-crypto-policy)#
management crypto-policy
Apply the crypto policy to management traffic.
Syntax
management crypto-policy name
To remove the management traffic crypto policy, use the no management crypto-policy name
command.
Parameters
name
Enter the name for the crypto policy.
Defaults none
Command Modes CONFIGURATION
Supported Modes FullSwitch
Command
History
Version Description
9.9(0.0) Introduced on the FN IOM.
9.2(0.0) Introduced on the MXL 10/40GbE Switch IO Module.
match
Match a sequence number to the transmission control protocol (TCP)/user datagram protocol (UDP) packets.
Syntax
match seq-num {tcp | udp} {ipv6 | ip} port-num dest-ip dest-port-num
To remove the match filter for the crypto map, use the no match seq-num command.
Parameters
seq-num
Enter the match command sequence number. The range is from 0 to 255.
tcp Enter the keyword tcp to configure a TCP access list filter.
udp
Enter the keyword udp to configure a UDP access list filter.
ipv6
Enter the source IPv6 address.
ip
Enter the source IPv4 address.
port-num
Enter the source port number. The range is from 0 to 65535
dest-ip
Enter the destination IP address.
dest-port-num
Enter the destination port number. The range is from 0 to 65535.
Defaults none
Command Modes CONFIG-CRYPTO-POLICY
Supported Modes FullSwitch
Command
History
Version Description
9.9(0.0) Introduced on the FN IOM.
9.2(0.0) Introduced on the MXL 10/40GbE Switch IO Module.
Internet Protocol Security (IPSec) 575