343
Step Command
Remarks
4.
Specify the integrity
protection algorithms.
In non-FIPS mode:
integrity
{
aes-xcbc-mac
|
md5
|
sha1
|
sha256
|
sha384
|
sha512
}
*
In FIPS mode:
integrity
{
sha1
|
sha256
|
sha384
|
sha512
} *
By default, an IKEv2 proposal does
not have any integrity protection
algorithms.
5.
Specify the PRF
algorithms.
In non-FIPS mode:
prf
{
aes-xcbc-mac
|
md5
|
sha1
|
sha256
|
sha384
|
sha512
} *
In FIPS mode:
prf
{
sha1
|
sha256
|
sha384
|
sha512
} *
By default, an IKEv2 proposal uses
the integrity protection algorithms as
the PRF algorithms.
6.
Specify the DH groups.
In non-FIPS mode:
dh
{
group1
|
group14
|
group19
|
group2
|
group20
|
group24
|
group5
} *
In FIPS mode:
dh
{
group14
|
group19
|
group20
|
group24
} *
By default, an IKEv2 proposal does
not have any DH groups.
Configuring an IKEv2 keychain
An IKEv2 keychain specifies the pre-shared keys used for IKEv2 negotiation.
An IKEv2 keychain can have multiple IKEv2 peers. Each peer has a symmetric pre-shared key or an
asymmetric pre-shared key pair, and information for identifying the peer (such as the peer's host
name, IP address or address range, or ID).
An IKEv2 negotiation initiator uses the peer host name or IP address/address range as the matching
criterion to search for a peer. A responder uses the peer host IP address/address range or ID as the
matching criterion to search for a peer.
To configure an IKEv2 keychain:
Step Command
Remarks
1.
Enter system view.
system-view
N/A
2.
Create an IKEv2 keychain
and enter IKEv2 keychain
view.
ikev2 keychain
keychain-name
By default, no IKEv2 keychains
exist.
3.
Create an IKEv2 peer and
enter IKEv2 peer view.
peer
name
By default, no IKEv2 peers exist.
Summary of Contents for 10500 series
Page 326: ...312 No duration limit for this SA ...