Related commands
display ike proposal
display ike proposal
Use display ike proposal to display configuration information about all IKE proposals.
Syntax
display ike proposal
Views
Any view
Predefined user roles
network-admin
network-operator
Usage guidelines
This command displays the configuration information about all IKE proposals in the descending order of
proposal priorities. If no IKE proposal is configured, the command displays the default IKE proposal.
Examples
# Display the configuration information about all IKE proposals.
<Sysname> display ike proposal
Priority Authentication Authentication Encryption Diffie-Hellman Duration
method algorithm algorithm group (seconds)
----------------------------------------------------------------------------
1 RSA-SIG SHA1 AES-CBC-128 Group 14 5000
11 PRE-SHARED-KEY SHA1 AES-CBC-128 Group 14 50000
default PRE-SHARED-KEY SHA1 AES-CBC-128 Group 14 86400
Table 46 Command output
Field Description
Priority Priority of the IKE proposal
Authentication method Authentication method used by the IKE proposal.
Authentication algorithm
Authentication algorithm used in the IKE proposal:
• MD5—HMAC-MD5 algorithm.
• SHA—HMAC-SHA1 algorithm.
Encryption algorithm
Encryption algorithm used by the IKE proposal.
• 3DES-CBC—168-bit 3DES algorithm in CBC mode.
• AES-CBC-128—28-bit AES algorithm in CBC mode.
• AES-CBC-192—192-bit AES algorithm in CBC mode.
• AES-CBC-256—256-bit AES algorithm in CBC mode.
• DES-CBC—56-bit DES algorithm in CBC mode.
Diffie-Hellman group DH group used in IKE negotiation phase 1.
370