Ike Configuration Commands; Authentication-Algorithm; Authentication-Method - HP 5120 SI series Command Reference Manual

Hide thumbs Also See for 5120 SI series:
Table of Contents

Advertisement

IKE configuration commands

IKE configuration commands are available only for the switches in FIPS mode. For more information
about FIPS mode, see Security Configuration Guide.

authentication-algorithm

Syntax
authentication-algorithm sha
undo authentication-algorithm
View
IKE proposal view
Default level
2: System level
Parameters
sha: Uses HMAC-SHA1.
Description
Use the authentication-algorithm command to specify an authentication algorithm for an IKE proposal.
Use the undo authentication-algorithm command to restore the default.
By default, an IKE proposal uses the SHA1 authentication algorithm.
Related commands: ike proposal and display ike proposal.
Examples
# Set SHA1 as the authentication algorithm for IKE proposal 10.
<Sysname> system-view
[Sysname] ike proposal 10
[Sysname-ike-proposal-10] authentication-algorithm sha

authentication-method

Syntax
authentication-method { pre-share | rsa-signature }
undo authentication-method
View
IKE proposal view
Default level
2: System level
Parameters
pre-share: Uses the pre-shared key method.
351

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents