[Contents] [Prev] [Next] [Index] [Report an Error]

Configuring the Authentication Algorithm for an IKE Proposal

To configure an IKE authentication algorithm, include the authentication-algorithm statement at the [edit security ike proposal ike-proposal-name] hierarchy level:

[edit security ike proposal ike-proposal-name]
authentication-algorithm (md5 | sha1);

The authentication algorithm can be one of the following:


[Contents] [Prev] [Next] [Index] [Report an Error]