H3C S6550X-HI Series Command Reference Manual page 2306

Table of Contents

Advertisement

Field
Authentication-algorithm
Encryption-algorithm
Life duration(sec)
Remaining key duration(sec)
Exchange-mode
Diffie-Hellman group
NAT traversal
Extend authentication
Assigned IP address
Vendor ID index
Vendor ID sequence number
display ike statistics
Use
display ike statistics
Syntax
display ike statistics
Views
Any view
Predefined user roles
network-admin
network-operator
Examples
# Display IKE statistics.
<Sysname> display ike statistics
IKE statistics:
No matching proposal: 0
Invalid ID information: 0
Unavailable certificate: 0
Unsupported DOI: 0
Description
Authentication algorithm used by the IKE proposal:
MD5—HMAC-MD5 algorithm.
SHA1—HMAC-SHA1 algorithm.
SHA256—HMAC-SHA256 algorithm.
SHA384—HMAC-SHA384 algorithm.
SHA512—HMAC-SHA512 algorithm.
Encryption algorithm used by the IKE proposal:
3DES-CBC—168-bit 3DES algorithm in CBC mode.
AES-CBC-128—128-bit AES algorithm in CBC mode.
AES-CBC-192—192-bit AES algorithm in CBC mode.
AES-CBC-256—256-bit AES algorithm in CBC mode.
DES-CBC—56-bit DES algorithm in CBC mode.
Lifetime of the IKE SA in seconds.
Remaining lifetime of the IKE SA in seconds.
IKE negotiation mode in phase 1: Main or Aggressive.
DH group used for key negotiation in IKE phase 1.
Whether a NAT gateway is detected.
Whether extended authentication for clients is enabled.
IP address assigned to the remote peer.
This field is not displayed if no IP address is assigned.
Vendor ID index used when the IKE negotiation was triggered.
Vendor ID sequence number used when the IKE negotiation was
triggered.
to display IKE statistics.
12

Advertisement

Table of Contents
loading

Table of Contents