24
aes-ctr-256
: Specifies the AES algorithm in CTR mode, which uses a 256-bit key. This keyword
is available only for IKEv2.
camellia-cbc-128
: Specifies the Camellia algorithm in CBC mode, which uses a 128-bit key.
This keyword is available only for IKEv2.
camellia-cbc-192
: Specifies the Camellia algorithm in CBC mode, which uses a 192-bit key.
This keyword is available only for IKEv2.
camellia-cbc-256
: Specifies the Camellia algorithm in CBC mode, which uses a 256-bit key.
This keyword is available only for IKEv2.
des-cbc
: Specifies the DES algorithm in CBC mode, which uses a 64-bit key.
gmac-128
: Specifies the GMAC algorithm, which uses a 128-bit key. This keyword is available only
for IKEv2.
gmac-192
: Specifies the GMAC algorithm, which uses a 192-bit key. This keyword is available only
for IKEv2.
gmac-256
: Specifies the GMAC algorithm, which uses a 256-bit key. This keyword is available only
for IKEv2.
gcm-128
: Specifies the GCM algorithm, which uses a 128-bit key. This keyword is available only for
IKEv2.
gcm-192
: Specifies the GCM algorithm, which uses a 192-bit key. This keyword is available only for
IKEv2.
gcm-256
: Specifies the GCM algorithm, which uses a 256-bit key. This keyword is available only for
IKEv2.
null
: Specifies the NULL algorithm, which means encryption is not performed.
Usage guidelines
You can specify multiple ESP encryption algorithms for one IPsec transform set, and the algorithm
specified earlier has a higher priority.
For a manual or IKEv1-based IPsec policy, the first specified ESP encryption algorithm takes effect.
To make sure an IPsec tunnel can be established successfully, the IPsec transform sets specified at
both ends of the tunnel must have the same first ESP encryption algorithm.
GCM and GMAC algorithms are combined mode algorithms. GCM algorithms provide encryption
and authentication services. GMAC algorithms only provide authentication service. Combined mode
algorithms can be used only when ESP is used alone without AH. Combined mode algorithms
cannot be used together with ordinary ESP authentication algorithms.
Examples
# Configure IPsec transform set
tran1
to use the AES-CBC-128 algorithm as the ESP encryption
algorithm.
<Sysname> system-view
[Sysname] ipsec transform-set tran1
[Sysname-ipsec-transform-set-tran1] esp encryption-algorithm aes-cbc-128
Related commands
ipsec transform-set
ike-profile
Use
ike-profile
to specify an IKE profile for an IPsec policy, IPsec policy template, or IPsec
profile.
Use
undo ike-profile
to restore the default.
Summary of Contents for SOHO IE4300
Page 285: ...i Contents Tcl commands 1 cli 1 tclquit 1 tclsh 2...
Page 288: ...i Contents Python commands 1 exit 1 python 1 python filename 2...
Page 291: ...i Contents Automatic configuration commands 1 autodeploy udisk enable 1...
Page 323: ...25 Sysname Ten GigabitEthernet1 0 51 undo shutdown Related commands irf port...
Page 465: ...ii stp vlan enable 55 vlan mapping modulo 55...
Page 602: ...12 Related commands display mvrp statistics...
Page 609: ...i Contents VLAN mapping commands 1 display vlan mapping 1 vlan mapping 2...
Page 678: ...9 Related commands reset pppoe relay statistics...
Page 846: ...i Contents Basic IP forwarding commands 1 display fib 1 ip forwarding table save 2...
Page 1770: ...i Contents Time range commands 1 display time range 1 time range 1...
Page 2026: ...34 Related commands display mac authentication...
Page 2028: ...ii...
Page 2143: ...i Contents User profile commands 1 display user profile 1 user profile 2...
Page 2308: ...61 ipsec transform set...
Page 2531: ...i Contents SAVI commands 1 ipv6 savi down delay 1 ipv6 savi log enable 1 ipv6 savi strict 2...
Page 2534: ...3 Sysname ipv6 savi strict Related commands ipv6 verify source...
Page 2791: ...14 Sysname track 1 Related commands delay display track...
Page 2939: ...9 sntp authentication keyid sntp reliable authentication keyid...
Page 2967: ...27 Related commands apply poe profile poe enable poe max power interface view poe priority...