H3C S6550X-HI Series Command Reference Manual page 2302

Table of Contents

Advertisement

Views
Any view
Predefined user roles
network-admin
network-operator
Usage guidelines
This command displays the configuration information about all IKE proposals in descending order of
proposal priorities. If no IKE proposal is configured, this command displays the default IKE proposal.
Examples
# Display the configuration information about all IKE proposals.
<Sysname> display ike proposal
Priority Authentication Authentication Encryption
----------------------------------------------------------------------------
1
RSA-SIG
11
PRE-SHARED-KEY
default
PRE-SHARED-KEY
Table 1 Command output
Field
Priority
Authentication method
Authentication algorithm
Encryption algorithm
Diffie-Hellman group
Duration (seconds)
Related commands
ike proposal
method
algorithm
SHA1
SHA1
SHA1
Diffie-Hellman Duration
algorithm
DES-CBC
Group 1
DES-CBC
Group 1
DES-CBC
Group 1
Description
Priority of the IKE proposal
Authentication method used by the IKE proposal:
DSA-SIG—DSA signature.
PRE-SHARED-KEY—Preshared key.
RSA-SIG—RSA signature.
RSA-DE—RSA digital envelope.
Authentication algorithm used in the IKE proposal:
MD5—HMAC-MD5 algorithm.
SHA1—HMAC-SHA1 algorithm.
SHA256—HMAC-SHA256 algorithm.
SHA384—HMAC-SHA384 algorithm.
SHA512—HMAC-SHA512 algorithm.
Encryption algorithm used by the IKE proposal:
3DES-CBC—168-bit 3DES algorithm in CBC mode.
AES-CBC-128—128-bit AES algorithm in CBC mode.
AES-CBC-192—192-bit AES algorithm in CBC mode.
AES-CBC-256—256-bit AES algorithm in CBC mode.
DES-CBC—56-bit DES algorithm in CBC mode.
DH group used in IKE negotiation phase 1.
IKE SA lifetime (in seconds) of the IKE proposal
8
group
(seconds)
5000
50000
86400

Advertisement

Table of Contents
loading

Table of Contents