Dell Brocade G620 Brocade 8.0.1 Fabric OS Command Reference - Page 482
References, SEE ALSO, A Profile for IPv6 in the U.S. Government
View all Dell Brocade G620 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 482 highlights
ipSecConfig References SEE ALSO -direction -local -remote -transform [-protocol ] traffic flow direction source IPv4 or IPv6 address peers IPv4 or IPv6 address transform name protocol nam switch:admin> ipsecconfig --help modify policy ike Usage: ipsecConfig --modify policy ike ARGUMENTS ARGUMENTS -tag -remote -id -remoteid -enc -hash -prf -dh ike policy name peers ipaddress local identifier peers identifier encryption algorithm hash algorithm prf algorithm dh group number ENCRYPTION ALGORITHM 3des_cbc, aes128_cbc, aes256_cbc, null_enc HASH ALGORITHM hmac_md5, hmac_sha1, aes_xcbc PRF ALGORITHM hmac_md5, hmac_sha1, aes_xcbc DH-GROUP modp768(1), modp1024(2), modp2048(14), modp8192(18) • [DISR] "DOD IPv6 Standards Profiles for IPv6 Capable Products", v2.0 (6/15/2007). • [NIST] "A Profile for IPv6 in the U.S. Government", v1.0 (1/31/2007). • [4301] Kent, S. and K. Seo, "Security Architecture for the Internet Protocol", RFC 4301 (Dec 2005). • [4302] Kent, S., "IP Authentication Header", RFC4302 (Dec 2005). • [4303] Kent, S., "IP Encapsulating Security Payload (ESP)", RFC4303 (Dec 2005). • [4306] Kaufman, C., Ed., "The Internet Key Exchange (IKEv2) Protocol", RFC 4306 (Dec 2005). None 458 Brocade Fabric OS Command Reference 53-1004112-02