Hash – Enterasys Networks X-Pedition XSR CLI User Manual

Page 552

Advertising
background image

ISAKMP Protocol Policy Mode Commands

14-98 Configuring the VPN

Syntax of the “no” Form

The no form of this command resets the value to the default:

no group

Default

Group 2

Mode

ISAKMP protocol policy configuration: 

XSR(config-isakmp)#

Example

The following example configures Group 5 on ACMEproposal:

XSR(config)#crypto isakmp proposal ACMEproposal
XSR(config-isakmp)#Group5

hash

This command sets the hash algorithm used in an IKE proposal (policy).

Syntax

hash {sha | md5}

Syntax of the “no” Form

The no form this command resets to the default ‐ sha:

no hash

Default

sha

Mode

ISAKMP Protocol Policy configuration: 

XSR(config-isakmp)#

Example

This example specifies MD‐5 as the hash algorithm to be used for  IKE proposal ACMEproposal:

XSR(config)#crypto isakmp proposal ACMEproposal
XSR(config-isakmp)#hash md5

sha

Secure Hash Algorithm1 (SHA‐1) hash.

md5

Message‐Digest Algorithm (MD5) algorithm.

Advertising