Cisco 3DES Panduan Pengguna - Halaman 6

Jelajahi secara online atau unduh pdf Panduan Pengguna untuk Perangkat Keras Jaringan Cisco 3DES. Cisco 3DES 23 halaman. Vpn encryption module (aim-vpn/epii, aim-vpn/hpii, aim-vpn/bpii family)

Cisco 3DES Panduan Pengguna
clear crypto engine accelerator counter
clear crypto engine accelerator counter
To reset the statistical and error counters for a router's hardware accelerator to zero, use the clear crypto
engine accelerator counter command in privileged EXEC mode.
Syntax Description
This command has no arguments or keywords.
Defaults
No default behavior or values
Command Modes
Privileged EXEC
Command History
Release
12.1(3)XL
12.2(2)XA
12.2(13)T
12.2(15)ZJ
12.3(4)T
Examples
The following example shows the router's statistical and error counters being cleared to zero:
Router# clear crypto engine accelerator counter
Related Commands
Command
crypto ca
crypto cisco
crypto dynamic-map
crypto engine accelerator
crypto ipsec
crypto isakmp
crypto key
crypto map
Cisco IOS Release 12.3(7)T
6
DES/3DES/AES VPN Encryption Module (AIM-VPN/EPII, AIM-VPN/HPII, AIM-VPN/BPII Family)
clear crypto engine accelerator counter
Modification
This command was introduced for the Cisco uBR905 cable access router.
Support was added for the Cisco uBR925 cable access router.
This command was integrated into Cisco IOS Release 12.2(13)T and
implemented for the AIM-VPN/EPII & AIM-VPN/HPII on the following
platforms: Cisco 2691, Cisco 3660, Cisco 3725, and Cisco 3745.
This command was implemented for the AIM-VPN/BPII on the following
platforms: Cisco 2610XM, Cisco 2611XM, Cisco 2620XM,
Cisco 2621XM, Cisco 2650XM, and Cisco 2651XM.
This command was integrated into Cisco IOS Release 12.3(4)T.
Description
Defines the parameters for the certification authority used for a
session.
Defines the encryption algorithms and other parameters for a
session.
Creates a dynamic map crypto configuration for a session.
Enables the use of the onboard hardware accelerator for IPSec
encryption.
Defines the IPSec security associations and transformation sets.
Enables and defines the IKE protocol and its parameters.
Generates and exchanges keys for a cryptographic session.
Creates and modifies a crypto map for a session.