isakmp am-disable (Deprecated)
To disable inbound aggressive mode connections, use the isakmp am-disable command in global configuration mode. To enable inbound aggressive mode connections, use the no form of this command.
isakmp am-disable
no isakmp am-disable
Syntax Description
This command has no arguments or keywords.
Command Default
The default value is enabled.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode |
Firewall Mode |
Security Context |
|||
---|---|---|---|---|---|
Routed |
Transparent |
Single |
Multiple |
||
Context |
System |
||||
Global Configuration |
|
— |
|
— |
— |
Command History
Release |
Modification |
---|---|
7.0(1) |
This command was added. |
7.2(1) |
This command was deprecated. The crypto isakmp am-disable command replaced it. |
Examples
The following example, entered in global configuration mode, disables inbound aggressive mode connections:
ciscoasa(config)# isakmp am-disable