42
dh-group24
: Uses 2048-bit and 256-bit subgroup Diffie-Hellman group.
dh-group19
: Uses 256-bit ECP Diffie-Hellman group. This keyword is available only for IKEv2.
dh-group20
: Uses 384-bit ECP Diffie-Hellman group. This keyword is available only for IKEv2.
Usage guidelines
In terms of security and required calculation time, the following groups are in descending order:
384-bit ECP Diffie-Hellman group (
dh-group20
), 256-bit ECP Diffie-Hellman group (
dh-group19
),
2048-bit and 256-bit subgroup Diffie-Hellman group (
dh-group24
), 2048-bit Diffie-Hellman group
(
dh-group14
), 1536-bit Diffie-Hellman group (
dh-group5
), 1024-bit Diffie-Hellman group
(
dh-group2
), and 768-bit Diffie-Hellman group (
dh-group1
).
If IKEv1 is used, the security level of the Diffie-Hellman group of the initiator must be higher than or
equal to that of the responder. This restriction does not apply to IKEv2.
The end without the PFS feature performs IKE negotiation according to the PFS requirements of the
peer end.
Examples
# Enable PFS using 2048-bit Diffie-Hellman group for IPsec transform set
tran1
.
<Sysname> system-view
[Sysname] ipsec transform-set tran1
[Sysname-ipsec-transform-set-tran1] pfs dh-group14
protocol
Use
protocol
to specify a security protocol for an IPsec transform set.
Use
undo protocol
to restore the default.
Syntax
protocol
{
ah
|
ah-esp
|
esp
}
undo protocol
Default
The IPsec transform set uses the ESP protocol.
Views
IPsec transform set view
Predefined user roles
network-admin
Parameters
ah
: Specifies the AH protocol.
ah-esp
: Specifies using the ESP protocol first and then using the AH protocol.
ah
: Specifies the AH protocol.
Usage guidelines
The two tunnel ends must use the same security protocol in the IPsec transform set.
Examples
# Specify the AH protocol for the IPsec transform set.
<Sysname> system-view
[Sysname] ipsec transform-set tran1
Summary of Contents for SOHO IE4300
Page 285: ...i Contents Tcl commands 1 cli 1 tclquit 1 tclsh 2...
Page 288: ...i Contents Python commands 1 exit 1 python 1 python filename 2...
Page 291: ...i Contents Automatic configuration commands 1 autodeploy udisk enable 1...
Page 323: ...25 Sysname Ten GigabitEthernet1 0 51 undo shutdown Related commands irf port...
Page 465: ...ii stp vlan enable 55 vlan mapping modulo 55...
Page 602: ...12 Related commands display mvrp statistics...
Page 609: ...i Contents VLAN mapping commands 1 display vlan mapping 1 vlan mapping 2...
Page 678: ...9 Related commands reset pppoe relay statistics...
Page 846: ...i Contents Basic IP forwarding commands 1 display fib 1 ip forwarding table save 2...
Page 1770: ...i Contents Time range commands 1 display time range 1 time range 1...
Page 2026: ...34 Related commands display mac authentication...
Page 2028: ...ii...
Page 2143: ...i Contents User profile commands 1 display user profile 1 user profile 2...
Page 2308: ...61 ipsec transform set...
Page 2531: ...i Contents SAVI commands 1 ipv6 savi down delay 1 ipv6 savi log enable 1 ipv6 savi strict 2...
Page 2534: ...3 Sysname ipv6 savi strict Related commands ipv6 verify source...
Page 2791: ...14 Sysname track 1 Related commands delay display track...
Page 2939: ...9 sntp authentication keyid sntp reliable authentication keyid...
Page 2967: ...27 Related commands apply poe profile poe enable poe max power interface view poe priority...