crypto am-disable
To disable IPsec IKEv1 inbound aggressive mode connections, use the crypto ikev1 am-disable command in global configuration mode. To enable inbound aggressive mode connections, use the no form of this command.
crypto ikev1 am-disable
no crypto ikev1 am-disable
Syntax Description
This command has no arguments or keywords.
Command Default
The default value is enabled.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode |
Firewall Mode |
Security Context |
|||
---|---|---|---|---|---|
Routed |
Transparent |
Single |
Multiple |
||
Context |
System |
||||
Global Configuration |
|
— |
|
— |
— |
Command History
Release |
Modification |
---|---|
7.0(1) |
The isakmp am-disable command was added. |
7.2.(1) |
The crypto isakmp am-disable command replaces the isakmp am-disable command. |
8.4(1) |
The command name was changed from crypto isakmp am-disable to crypto ikev1 am-disable. |
Examples
The following example, entered in global configuration mode, disables inbound aggressive mode connections:
ciscoasa(config)# crypto ikev1 am-disable