Ipsec Configuration Commands; Ah Authentication-Algorithm; Display Ipsec Policy - HP 3600 v2 Series Command Reference Manual

Hide thumbs Also See for 3600 v2 Series:
Table of Contents

Advertisement

IPsec configuration commands

NOTE:
The 3600 v2 EI switches support using IPsec for OSPFv3, IPv6 BGP, and RIPng; the 3600 v2 SI switches
only support using IPsec for RIPng.

ah authentication-algorithm

Syntax
ah authentication-algorithm { md5 | sha1 }
undo ah authentication-algorithm
View
IPsec proposal view
Default level
2: System level
Parameters
md5: Uses MD5.
sha1: Uses SHA1.
Description
Use the ah authentication-algorithm command to specify an authentication algorithm for the
authentication header (AH) protocol.
Use the undo ah authentication-algorithm command to restore the default.
By default, MD5 is used.
Before specifying the authentication algorithm for AH, be sure to use the transform command to specify
the security protocol as AH or both AH and ESP.
Related commands: ipsec proposal and transform.
Examples
# Configure IPsec proposal prop1 to use AH and SHA1.
<Sysname> system-view
[Sysname] ipsec proposal prop1
[Sysname-ipsec-proposal-prop1] transform ah
[Sysname-ipsec-proposal-prop1] ah authentication-algorithm sha1

display ipsec policy

Syntax
display ipsec policy [ brief | name policy-name [ seq-number ] ] [ | { begin | exclude | include }
regular-expression ]
231

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents