Table of Contents

Advertisement

authentication-algorithm: HASH-SHA1
encryption-algorithm: DES-CBC
life duration(sec): 86400
remaining key duration(sec): 82236
exchange-mode: MAIN
diffie-hellman group: GROUP1
nat traversal: NO
Table 50 Command output
Field
vpn-instance
transmitting entity
local id type
local id
remote id type
remote id
local ip
remote ip
connection id
authentication-method
authentication-algorithm
encryption-algorithm
life duration(sec)
remaining key duration(sec)
exchange-mode
diffie-hellman group
nat traversal
Related commands
ike proposal
ike peer

dpd

Use dpd to apply a DPD detector to an IKE peer.
Use undo dpd to remove the application.
Syntax
dpd dpd-name
undo dpd
Description
MPLS L3VPN that the protected data belongs to.
Entity in the IKE negotiation.
Identifier type of the local gateway.
Identifier of the local gateway.
Identifier type of the remote gateway.
Identifier of the remote security gateway.
IP address of the local gateway.
IP address of the remote gateway.
Identifier of the IKE SA and IPsec SA.
Authentication method used by the IKE proposal.
Authentication algorithm used by the IKE proposal.
Encryption algorithm used by the IKE proposal.
Lifetime of the ISAKMP SA in seconds.
Remaining lifetime of the ISAKMP SA in seconds.
IKE negotiation mode in phase 1.
DH group used for key negotiation in IKE phase 1.
Whether NAT traversal is enabled.
334

Advertisement

Table of Contents
loading

This manual is also suitable for:

Hp 6600

Table of Contents