Crypto Ike Policy Proposal Hash-Algorithm - Avaya Secure Router 3120 Command Reference Manual

Modular system that converges routing, security and multimedia traffic
Hide thumbs Also See for Secure Router 3120:
Table of Contents

Advertisement

parameter
aes-cbc
example: SR> configure term SR/configure> crypto SR/crypto> ike policy toOpal 100.1.1.1
SR/crypto/ike/policy toOpal 100.1.1.1l> proposal 1 SR/crypto/ike/policy toOpal 100.1.1.1/
proposal> encryption-algorithm 3des-cbc
applies to:
All modules

crypto ike policy proposal hash-algorithm

Configures the IKE hash algorithm for a proposal.
syntax:
[no] configure crypto ike policy <policy-name> <peer-address> proposal <proposal-priority>
hash-algorithm [md5 | sha1]
parameter
md5
sha1
example: SR> configure term SR/configure> crypto SR/crypto> ike policy toOpal 100.1.1.1
SR/crypto/ike/policy toOpal 100.1.1.1l> proposal 1 SR/crypto/ike/policy toOpal 100.1.1.1/
proposal> hash-algorithm md5
applies to:
All modules
crypto ike policy proposal lifetime
Configures lifetime of the IKE SA. When the SA expires, it is replaced by a new negotiated
SA or terminated. To reset the lifetime to the default value, use the no form.
syntax:
[no] configure crypto ike policy <policy-name> <peer-address> proposal <proposal priority>
lifetime [seconds <secs> | kilobytes <kb>]
Avaya Secure Router 3120 Command Reference Guide
Advanced Encryption Standard algorithm with cipher block
chaining. 128-bit, 192-bit, and 256-bit AES is supported.
Produces a 128-bit message digest per RFC 1321.
Produces a 160-bit message digest. This is the default.
crypto ike policy proposal hash-algorithm
definition
definition
December 2010
725

Advertisement

Table of Contents
loading

Table of Contents