To configure an IKE authentication algorithm, include the authentication-algorithm statement at the [edit security ike proposal ike-proposal-name] hierarchy level:
- [edit security ike proposal ike-proposal-name]
-
authentication-algorithm (md5 | sha1);
The authentication algorithm can be one of the following: