Product specifications
Efficient Networks
®
Router family
Command Line Interface Guide
Chapter 12: IKE/IPsec Commands
Efficient Networks
®
Page 12-25
ike ipsec proposals set ahauth
Sets the proposal parameter that determines whether AH message authentication is
requested and, if it is requested, the hash algorithm used.
NOTE:
The proposal must select either the AH or ESP encapsulation methods. It cannot
request AH authentication if it requests ESP encryption and/or ESP authentication.
For more information, see “ESP and AH Security Protocols” on page 5-51. Or, see
“IKE IPSec Proposal Commands” on page 5-58.
Mgmt Class
Security (R/W)
Input Format
ike ipsec proposals set ahauth <md5 | sha1 | none>
<proposalname>
Parameters
Example
Response
Command prompt.
md5
Use AH encapsulation and authenticate using hash algorithm
Message Digest 5.
sha1
Use AH encapsulation and authenticate using hash algorithm
Secure Hash Algorithm-1.
none
No AH encapsulation and no AH message authentication. (If you
select this option, ESP encapsulation must be requested by a
ike
ipsec proposals set espenc
or ike ipsec proposals set espauth.)
<proposalname>
a
a
ASCII string
Name of the IPsec proposal to which the AH authentication pa-
rameter is added.
b
b
To see the proposal names in use, use the ike ipsec proposals list command.
-> ike ipsec proposals set ahauth sha1 myproposal