Debugging Encrypt-Card - 3Com 3C13618 Command Reference Manual

3com 3c13618: reference guide
Table of Contents

Advertisement

sha1-hmac-96 algorithm performs on the basis of 64-byte data block, and produces
a 96-digit authentication secret key. The security protection is provided mainly by
HMAC and then by SHA-1 algorithm.
md5-hmac-96 algorithm also performs on the basis of 64-byte data block, and
produces a 96-digit authentication secret key. The security protection is provided
mainly by HMAC and then by MD5 algorithm.
Compared with MD5, SHA-1 contained more summary information, and is more
secure, but the authentication speed is a little slow.
The IPSec proposal adopted by the security policy set at both ends of the security
tunnel must be set as using the same authentication method.
For related commands, see ipsec proposal, proposal, sa inbound/outbound,
transform.
Example
# Configure IPSec proposal using AH and SHA1.
[3Com]ipsec proposal trans1
[3Com-ipsec-proposal-trans1]transform ah-new
[3Com-ipsec-proposal-trans1]ah-new authentication-algorithm sha1-hmac-96

4.1.2 debugging encrypt-card

Syntax
debugging encrypt-card { all | command | error | misc | packet | sa } [ slot-id ]
debugging encrypt-card host { all | command | error | misc | packet | sa }
View
All views
Parameter
all: Enable all the debugging of the crypto card.
command: Enabling command debugging of the crypto card.
error: Enabling the error debugging of the crypto card.
misc: Enabling other debugging of the crypto card.
packet: Enabling packets process debugging on the crypto card.
sa: Enabling the SA debugging of the crypto card
Security
43

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

3c136123c136133c13616

Table of Contents