524
Field
Description
Authentication algorithm
Authentication algorithm used in the IKE proposal:
•
MD5
—HMAC-MD5 algorithm.
•
SHA1
—HMAC-SHA1 algorithm.
•
SHA256
—HMAC-SHA256 algorithm.
•
SHA384
—HMAC-SHA384 algorithm.
•
SHA512
—HMAC-SHA512 algorithm.
Encryption algorithm
Encryption algorithm used by the IKE proposal:
•
3DES-CBC
—168-bit 3DES algorithm in CBC mode.
•
AES-CBC-128
—128-bit AES algorithm in CBC mode.
•
AES-CBC-192
—192-bit AES algorithm in CBC mode.
•
AES-CBC-256
—256-bit AES algorithm in CBC mode.
•
DES-CBC
—56-bit DES algorithm in CBC mode.
Diffie-Hellman group
DH group used in IKE negotiation phase 1.
Duration (seconds)
IKE SA lifetime (in seconds) of the IKE proposal
Related commands
ike
proposal
display ike sa
Use
display ike sa
to display information about IKE SAs.
Syntax
display ike sa
[
verbose
[
connection-id
connection-id
|
remote-address
[
ipv6
]
remote-address
[
vpn-instance
vpn-instance-name
] ] ]
Views
Any view
Predefined user roles
network-admin
network-operator
Parameters
verbose
: Displays detailed information.
connection-id connection-id
: Displays detailed information about IKE SAs by connection ID in the
range of 1 to 2000000000.
remote-address
: Displays detailed information about IKE SAs with the specified remote address
.
ipv6
: Specifies an IPv6 address.
remote-address
: Remote IP address.
vpn-instance
vpn-instance-name
: Displays detailed information about IKE SAs in an MPLS L3VPN
instance. The
vpn-instance-name
argument represents the VPN instance name, a case-sensitive
string of 1 to 31 characters. To display information about IKE SAs on the public network, do not
specify this option.
Usage guidelines
If you do not specify any parameters, this command displays summary information about all IKE
SAs.
Summary of Contents for FlexNetwork MSR Series
Page 1005: ...987 ...