529
on-demand
: Triggers DPD on demand. The device triggers DPD if it has IPsec traffic to send and
has not received any IPsec packets from the peer for the specified interval.
periodic
: Triggers DPD at regular intervals. The device triggers DPD at the specified interval.
Usage guidelines
DPD is triggered periodically or on-demand. As a best practice, use the on-demand mode when the
device communicates with a large number of IKE peers. For an earlier detection of dead peers, use
the periodic triggering mode, which consumes more bandwidth and CPU.
When DPD settings are configured in both IKE profile view and system view, the DPD settings in IKE
profile view apply. If DPD is not configured in IKE profile view, the DPD settings in system view apply.
It is a good practice to set the triggering interval longer than the retry interval so that a DPD detection
does not occur during a DPD retry.
Examples
# Configure DPD to be triggered every 10 seconds and every 5 seconds between retries if the peer
does not respond.
<Sysname> system-view
[Sysname] ike profile 1
[Sysname-ike-profile-1] dpd interval 10 retry 5 on-demand
Related commands
ike dpd
encryption-algorithm
Use
encryption-algorithm
to specify an encryption algorithm for an IKE proposal.
Use
undo
encryption-algorithm
to restore the default.
Syntax
In non-FIPS mode:
encryption-algorithm
{
3des-cbc
|
aes-cbc-128
|
aes-cbc-192
|
aes-cbc-256
|
des-cbc
}
undo encryption-algorithm
In FIPS mode:
encryption-algorithm
{
aes-cbc-128
|
aes-cbc-192
|
aes-cbc-256
}
undo encryption-algorithm
Default
In non-FIPS mode, an IKE proposal uses the 56-bit DES encryption algorithm in CBC mode.
In FIPS mode, an IKE proposal uses the 128-bit AES encryption algorithm in CBC mode.
Views
IKE proposal view
Predefined user roles
network-admin
Parameters
3des-cbc
: Uses the 3DES algorithm in CBC mode as the encryption algorithm. The 3DES algorithm
uses a 168-bit key for encryption.
aes-cbc-128
: Uses the AES algorithm in CBC mode as the encryption algorithm. The AES algorithm
uses a 128-bit key for encryption.
Summary of Contents for FlexNetwork MSR Series
Page 1005: ...987 ...