Efficient Networks® Router family

Chapter 12: IKE/IPsec Commands

Command Line Interface Guide

 

 

 

ike ipsec proposals set ahauth

Sets the proposal parameter that determines whether AH message authentication is requested and, if it is requested, the hash algorithm used.

NOTE:

The proposal must select either the AH or ESP encapsulation methods. It cannot request AH authentication if it requests ESP encryption and/or ESP authentication.

For more information, see ESP and AH Security Protocols” on page 5-51.Or, see IKE IPSec Proposal Commands” on page 5-58.

Mgmt Class

Security (R/W)

Input Format

ike ipsec proposals set ahauth <md5 sha1 none> <proposalname>

Parameters

md5

Use AH encapsulation and authenticate using hash algorithm

 

Message Digest 5.

sha1

Use AH encapsulation and authenticate using hash algorithm

 

Secure Hash Algorithm-1.

none

No AH encapsulation and no AH message authentication. (If you

 

select this option, ESP encapsulation must be requested by a ike

 

ipsec proposals set espenc or ike ipsec proposals set espauth.)

<proposalname>a Name of the IPsec proposal to which the AH authentication pa- rameter is added.b

aASCII string

bTo see the proposal names in use, use the ike ipsec proposals list command.

Example

-> ike ipsec proposals set ahauth sha1 myproposal

Response

Command prompt.

Efficient Networks®

Page 12-25

Page 383
Image 383
Efficient Networks 107-0001-000 Ike ipsec proposals set ahauth md5 sha1 none proposalname, Secure Hash Algorithm-1