<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Question on differences in commands in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/question-on-differences-in-commands/m-p/2034042#M921230</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;I guess pertaining to 2, if i was speaking in terms of from a cisco router to another cisco router - would terminal be acceptable?&lt;BR /&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;yes the "crypto key import" command can take the input from a url and also from the terminal. In that case terminal wil be much easier.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&amp;nbsp; &lt;BR /&gt;Don't stop after you've improved your network! Improve the world by lending money to the working poor: &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://www.kiva.org/invitedby/karsteni"&gt;http://www.kiva.org/invitedby/karsteni&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 29 Aug 2012 15:09:29 GMT</pubDate>
    <dc:creator>Karsten Iwen</dc:creator>
    <dc:date>2012-08-29T15:09:29Z</dc:date>
    <item>
      <title>Question on differences in commands</title>
      <link>https://community.cisco.com/t5/network-security/question-on-differences-in-commands/m-p/2034039#M921227</link>
      <description>&lt;P&gt;Hey Guys-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I just had some questions pertaining to the differences between commands that appear to be performing the same function.&amp;nbsp; Can you let me know if one command is more preferred over the other and what the difference is.&amp;nbsp; I'd really appreciate it as it I'm currently practicing some INE labs and I see that the commands change from lab to lab.&amp;nbsp; Thanks ahead of time!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1.&amp;nbsp; When writing a static NAT for 1 specific host - does it matter if I include the /32 subnet?&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;EX:&lt;/STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; static (inside,outside) 1.1.1.1 2.2.2.2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; VS&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; static (inside,outside) 1.1.1.1 2.2.2.2 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2.&amp;nbsp; When I am configuring a router as CA server and it is required to "export" the key, does it matter my method of exporting the key?&amp;nbsp; If so, in what method would call for which solution?&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;EX:&lt;/STRONG&gt;&amp;nbsp; crypto key export rsa ciscox pem URL nvram: 3des cisco&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; VS&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; crypto key export rsa ciscox pem terminal 3des cisco&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3.&amp;nbsp; If I have to mark a packet with a DSCP value of X, does it matter if I use the "set dscp" VS "set ip dscp"?&amp;nbsp; If so, what's the difference?&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;EX:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;policy-map X&lt;/P&gt;&lt;P&gt;class X&lt;/P&gt;&lt;P&gt;set dscp X&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;VS&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map X&lt;/P&gt;&lt;P&gt;class X&lt;/P&gt;&lt;P&gt;set ip dscp X&amp;nbsp; &lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 12:43:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-on-differences-in-commands/m-p/2034039#M921227</guid>
      <dc:creator>CSCO11733516</dc:creator>
      <dc:date>2020-02-21T12:43:42Z</dc:date>
    </item>
    <item>
      <title>Re: Question on differences in commands</title>
      <link>https://community.cisco.com/t5/network-security/question-on-differences-in-commands/m-p/2034040#M921228</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;1.&amp;nbsp; When writing a static NAT for 1 specific host - does it matter if I include the /32 subnet?&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;STRONG style="border-collapse: collapse; list-style: none;"&gt;EX:&lt;/STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; static (inside,outside) 1.1.1.1 2.2.2.2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; VS&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; static (inside,outside) 1.1.1.1 2.2.2.2 netmask 255.255.255.255&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the result will be the same. It you don't include the netmask in that command /32 is taken. You can configure it without and with a "sh run static" you see it with netmask.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;2.&amp;nbsp; When I am configuring a router as CA server and it is required to "export" the key, does it matter my method of exporting the key?&amp;nbsp; If so, in what method would call for which solution?&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;STRONG style="border-collapse: collapse; list-style: none;"&gt;EX:&lt;/STRONG&gt;&amp;nbsp; crypto key export rsa ciscox pem URL nvram: 3des cisco&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; VS&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; crypto key export rsa ciscox pem terminal 3des cisco&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That depends o how you want to process the keys afterwards. If you have a system where you can paste the key then putting the key onto the terminal might be more comfortable. If you need the key as a file then storing it on the router and copying the key to the destination might be easier.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;3.&amp;nbsp; If I have to mark a packet with a DSCP value of X, does it matter if I use the "set dscp" VS "set ip dscp"?&amp;nbsp; If so, what's the difference?&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The first sets the DSCP für ipv4 and ipv6 packets, the other only for ipv4.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;happy studying ... &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&amp;nbsp; &lt;BR /&gt;Don't stop after you've improved your network! Improve the world by lending money to the working poor: &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://www.kiva.org/invitedby/karsteni" rel="nofollow"&gt;http://www.kiva.org/invitedby/karsteni&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Aug 2012 15:04:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-on-differences-in-commands/m-p/2034040#M921228</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2012-08-29T15:04:19Z</dc:date>
    </item>
    <item>
      <title>Question on differences in commands</title>
      <link>https://community.cisco.com/t5/network-security/question-on-differences-in-commands/m-p/2034041#M921229</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;karsten - kudos dude.&amp;nbsp; i appreciate your help bigtime!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess pertaining to 2, if i was speaking in terms of from a cisco router to another cisco router - would terminal be acceptable?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Aug 2012 15:05:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-on-differences-in-commands/m-p/2034041#M921229</guid>
      <dc:creator>CSCO11733516</dc:creator>
      <dc:date>2012-08-29T15:05:59Z</dc:date>
    </item>
    <item>
      <title>Re: Question on differences in commands</title>
      <link>https://community.cisco.com/t5/network-security/question-on-differences-in-commands/m-p/2034042#M921230</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;I guess pertaining to 2, if i was speaking in terms of from a cisco router to another cisco router - would terminal be acceptable?&lt;BR /&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;yes the "crypto key import" command can take the input from a url and also from the terminal. In that case terminal wil be much easier.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&amp;nbsp; &lt;BR /&gt;Don't stop after you've improved your network! Improve the world by lending money to the working poor: &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://www.kiva.org/invitedby/karsteni"&gt;http://www.kiva.org/invitedby/karsteni&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Aug 2012 15:09:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-on-differences-in-commands/m-p/2034042#M921230</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2012-08-29T15:09:29Z</dc:date>
    </item>
    <item>
      <title>Question on differences in commands</title>
      <link>https://community.cisco.com/t5/network-security/question-on-differences-in-commands/m-p/2034043#M921231</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Aug 2012 15:28:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-on-differences-in-commands/m-p/2034043#M921231</guid>
      <dc:creator>CSCO11733516</dc:creator>
      <dc:date>2012-08-29T15:28:36Z</dc:date>
    </item>
  </channel>
</rss>

