To configure an IKE authentication algorithm, include the authentication-algorithm statement at the [edit services ipsec-vpn ike proposal proposal-name] hierarchy level:
-
authentication-algorithm (md5 | sha1 | sha-256);
The authentication algorithm can be one of the following:
![]() |
Note: For reference information on Secure Hash Algorithms (SHAs), see Internet draft draft-eastlake-sha2-02.txt, Secure Hash Algorithms (SHA and HMAC-SHA) (expires July 2006). |