Ike Commands; Authentication-Algorithm; Authentication-Method - HP 6125XLG Command Reference Manual

Blade switch security command reference
Table of Contents

Advertisement

IKE commands

IKE commands are supported only when the switch is operating in FIPS mode. For more information
about FIPS mode, see Security Configuration Guide.

authentication-algorithm

Use authentication-algorithm to specify an authentication algorithm for an IKE proposal.
Use undo authentication-algorithm to restore the default.
Syntax
In non-FIPS mode:
authentication-algorithm { md5 | sha }
undo authentication-algorithm
In FIPS mode:
authentication-algorithm sha
undo authentication-algorithm
Default
The IKE proposal uses the authentication algorithm of HMAC-SHA1.
Views
IKE proposal view
Predefined user roles
network-admin
Parameters
md5: Specifies HMAC-MD5 as the authentication algorithm.
sha: Specifies HMAC-SHA1 as the authentication algorithm.
Examples
# Specify HMAC-SHA1 as the authentication algorithm for IKE proposal 1.
<Sysname> system-view
[Sysname] ike proposal 1
[Sysname-ike-proposal-1] authentication-algorithm sha
Related commands
display ike proposal

authentication-method

Use authentication-method to specify an authentication method to be used in an IKE proposal.
Use undo authentication-method to restore the default.
277

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents