Chapter 40 More About....
Reasons Why a Serial Interface or Subinterface Configuration May Be Read-Only
40-24
Cisco Router and Security Device Manager 2.5 User’s Guide
OL-4015-12
Examples
The following are examples of permissible transform combinations:
• ah-md5-hmac
• esp-des
• esp-3des and esp-md5-hmac
• ah-sha-hmac, esp-des, and esp-sha-hmac
• comp-lzs
Reasons Why a Serial Interface or Subinterface
Configuration May Be Read-Only
A previously configured Serial interface or subinterface will be read-only and will
not be configurable in the following cases:
• The interface is configured with the encapsulation ppp and
ppp multilink ... Cisco IOS commands.
• The interface is configured with the encapsulation hdlc and ip address
negotiated commands.
• The interface is part of a SERIAL_CSUDSU_56K WIC.
• The interface is part of a Sync/Async WIC configured with the
physical-layer async command.
esp-md5-hmac ESP with the MD5 (HMAC variant) authentication algorithm.
es-aes-128 ESP with Advanced Encryption Standard (AES). Encryption with a 128-bit key
esp-aes-192 ESP with AES. Encryption with a 192-bit key.
esp-aes-256 ESP with AES. Encryption with a 256-bit key.
esp-sha-hmac
ESP with the SHA (HMAC variant) authentication algorithm.
comp-lzs IP compression with the LZS algorithm.
Transform Description