Chapter40 More About....
Reasons Why a Serial Interface or Subinterface Configuration Ma y Be Read-Only
40-24
Cisco Router and Security Device Manager 2.5 User’s Guide
OL-4015-12

Examples

The following are examples of permissible transform combinations:
ah-md5-hmac
esp-des
esp-3des and esp-md5-hmac
ah-sha-hmac, esp-des, and esp-sha-hmac
comp-lzs
Reasons Why a Serial Interface or Subinterface
Configuration May Be Read-Only
A previously configured Serial interface or subinterface will be read-only and will
not be configurable in the following cases:
The interface is configured with the encapsulationppp and
ppp multilink ... CiscoIOS commands.
The interface is configured with the encapsulation hdlc and ip address
negotiated commands.
The interface is part of a SERIAL_CSUDSU_56K WIC.
The interface is part of a Sync/Async WIC configured with the
physical-layer async command.
esp-md5-hmac ESP with the MD5 (HMAC variant) authentication algorithm.
es-aes-128 ESP with Advanced Encryption Standard (AES). Encryption with a 128-b it key
esp-aes-192 ESP with AES. Encryption with a 192-bit key.
esp-aes-256 ESP with AES. Encryption with a 256-bit key.
esp-sha-hmac ESP with the SHA (HMAC variant) authentication algorithm.
comp-lzs IP compression with the LZS algorithm.
Transform Description