HP 6125XLG R2306-HP 6125XLG Blade Switch Security Command Reference - Page 289
display ike sa, Usage guidelines, Examples, Related commands, Syntax, Views, Predefined user roles
View all HP 6125XLG manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 289 highlights
Usage guidelines This command displays the configuration information about all IKE proposals in the descending order of proposal priorities. If no IKE proposal is configured, the command displays the default IKE proposal. Examples # Display the configuration information about all IKE proposals. display ike proposal Priority Authentication Authentication Encryption Diffie-Hellman Duration method algorithm algorithm group (seconds) 1 RSA-SIG SHA1 AES-CBC-128 Group 14 5000 11 PRE-SHARED-KEY SHA1 AES-CBC-128 Group 14 50000 default PRE-SHARED-KEY SHA1 AES-CBC-128 Group 14 86400 Table 40 Command output Field Priority Authentication method Authentication algorithm Encryption algorithm Diffie-Hellman group Duration (seconds) Description Priority of the IKE proposal Authentication method used by the IKE proposal. Authentication algorithm used in the IKE proposal: • MD5-HMAC-MD5 algorithm. • SHA-HMAC-SHA1 algorithm. Encryption algorithm used by the IKE proposal. • 3DES-CBC-168-bit 3DES algorithm in CBC mode. • AES-CBC-128-28-bit AES algorithm in CBC mode. • AES-CBC-192-192-bit AES algorithm in CBC mode. • AES-CBC-256-256-bit AES algorithm in CBC mode. • DES-CBC-56-bit DES algorithm in CBC mode. DH group used in IKE negotiation phase 1. IKE SA lifetime (in seconds) of the IKE proposal Related commands ike proposal display ike sa Use display ike sa to display information about the current IKE SAs. Syntax display ike sa [ verbose [ connection-id connection-id | remote-address [ ipv6 ] remote-address [ vpn-instance vpn-name ] ] ] Views Any view Predefined user roles network-admin 280