R211x-HP Flexfabric 11900 Security Command Reference

Table Of Contents
177
For an IKE-based IPsec policy, the initiator sends the first AH authentication algorithm specified in
the IPsec transform set to the peer end during the negotiation phase, and the responder matches the
received algorithm against its local algorithms until a match is found. To ensure a successful IKE
negotiation, the IPsec transform sets specified at both ends of the tunnel must have at least one same
AH authentication algorithm.
Examples
# Create an IPsec transform set, and specify the AH authentication algorithm for the transform set as
HMAC-SHA1.
<Sysname> system-view
[Sysname] ipsec transform-set tran1
[Sysname-ipsec-transform-set-tran1] ah authentication-algorithm sha1
description
Use description to configure description for an IPsec policy.
Use undo description to restore the default.
Syntax
description text
undo description
Default
No description is defined.
Views
IPsec policy view
Predefined user roles
network-admin
mdc-admin
Parameters
text: Specifies the description content, a case-sensitive string of 1 to 80 characters.
Usage guidelines
If the system has multiple IPsec policies, you can use this command to configure different descriptions for
them to distinguish them.
Examples
# Configure description for IPsec policy 1 as CenterToA.
<Sysname> system-view
[Sysname] ipsec policy policy1 1 isakmp
[Sysname-ipsec-policy-isakmp-policy1-1] description CenterToA
display ipsec { ipv6-policy | policy }
Use display ipsec { ipv6-policy | policy } to display information about IPsec policies.