H3C S6550X-HI Series Command Reference Manual page 2363

Table of Contents

Advertisement

: Specifies the HMAC-SHA384 algorithm.
sha384
: Specifies the HMAC-SHA512 algorithm.
sha512
Usage guidelines
You must specify a minimum of one integrity protection algorithm for an IKEv2 proposal. Otherwise,
the proposal is incomplete and useless. You can specify multiple integrity protection algorithms for
an IKEv2 proposal. An algorithm specified earlier has a higher priority.
Examples
# Create an IKEv2 proposal named prop1.
<Sysname> system-view
[Sysname] ikev2 proposal prop1
# Specify HMAC-SHA1 and HMAC-MD5 as the integrity protection algorithms, with HMAC-SHA1
preferred.
[Sysname-ikev2-proposal-prop1] integrity sha1 md5
Related commands
ikev2 proposal
keychain
Use
keychain
Use
undo keychain
Syntax
keychain keychain-name
undo keychain
Default
No IKEv2 keychain is specified for an IKEv2 profile.
Views
IKEv2 profile view
Predefined user roles
network-admin
Parameters
keychain-name
case-insensitive string of 1 to 63 characters and cannot contain a hyphen (-).
Usage guidelines
An IKEv2 keychain is required on both ends if either end uses preshared key authentication. You can
specify only one IKEv2 keychain for an IKEv2 profile.
You can specify the same IKEv2 keychain for different IKEv2 profiles.
Examples
# Create an IKEv2 profile named profile1.
<Sysname> system-view
[Sysname] ikev2 profile profile1
# Specify IKEv2 keychain keychain1.
[Sysname-ikev2-profile-profile1] keychain keychain1
to specify an IKEv2 keychain for preshared key authentication.
to restore the default.
: Specifies an IKEv2 keychain by its name. The keychain name is a
29

Advertisement

Table of Contents
loading

Table of Contents