Command Reference Guide
SROS Command Line Interface Reference Guide IKE Policy Attributes Command Set
5991-2114 © Copyright 2005 Hewlett-Packard Development Company, L.P. 390
hash [md5| sha]
Use the hash command to specify the hash algorithm to be used to authenticate the data transmitted over
the IKE SA.
Syntax Description
md5 Choose the md5 hash algorithm.
sha Choose the sha hash algorithm.
Default Values
By default, hash is set to sha.
Command Modes
(config-ike-attribute)# IKE Policy Attribute Configuration Mode
Usage Examples
The following example specifies md5 as the hash algorithm:
(config-ike-attribute)#hash
md5