R2511-HP MSR Router Series Security Command Reference(V5)

180
Usage guidelines
You must use the transform command to specify the AH security protocol or both AH and ESP before you
specify authentication algorithms for AH.
Examples
# Configure IPsec transform set prop1 to use AH and SHA1.
<Sysname> system-view
[Sysname] ipsec transform-set prop1
[Sysname-ipsec-transform-set-prop1] transform ah
[Sysname-ipsec-transform-set-prop1] ah authentication-algorithm sha1
Related commands
ipsec transform-set
transform
connection-name
Use connection-name to configure an IPsec connection name. This name functions only as a description
of the IPsec policy.
Use undo connection-name to restore the default.
Syntax
connection-name name
undo connection-name
Default
No IPsec connection name is configured.
Views
IPsec policy view, IPsec policy template view
Default command level
2: System level
Parameters
name: Specifies an IPsec connection name, a case-insensitive string of 1 to 32 characters.
Example
# Set IPsec connection name to CenterToA.
<Sysname> system-view
[Sysname] ipsec policy policy1 1 isakmp
[Sysname-ipsec-policy-isakmp-policy1-1] connection-name CenterToA
cryptoengine enable
Use cryptoengine enable to enable the encryption engine.
Use undo cryptoengine enable to disable the encryption engine.
Syntax
cryptoengine enable