R2511-HP MSR Router Series Security Command Reference(V5)
577
Field Description
Multicast rekeys received
Number of multicast rekeys received. This field is
displayed only when the GDOI GM group is a multicast
group.
Unicast rekeys received
Number of unicast rekeys received. This field is displayed
only when the GDOI GM group is a unicast group.
Rekey ACKs sent
Number of rekey ACK messages sent. This field is
displayed only when the GDOI GM group is a unicast
group.
Allowable rekey cipher
The rekey encryption algorithm that the GM allows. Any
indicates that the GM allows all encryption algorithms.
Allowable rekey hash
The rekey hash algorithm that the GM allows. Any
indicates that the GM allows all hash algorithms.
Allowable transform
The rekey transform mode that the GM allows. Any
indicates that the GM allows all transform modes.
Rekeys Cumulative Rekey statistics.
Total received Total number of rekeys that the GM has received.
After latest registration
Number of rekeys that the GM has received after the last
successful registration.
Rekey received ( hh:mm:ss)
The field is displays when a rekey is received. It indicates
the key lifetime after the rekey operation.
Rekey received
This field is displayed when no rekey is received. The
value for this field is None.
Total rekey ACKs sent
Number of rekey ACK messages sent. This field is
displayed only in unicast mode.
ACL Downloaded From KS 90.1.1.1
The ACL information downloaded from the KS at
90.1.1.1.
rule 0 deny udp source-port eq 848
destination-port eq 848
Indicates that any UDP packets whose source and
destination port numbers are both 848 do not need to be
protected by IPsec.
rule 1 deny ospf
Indicates that OSPF protocol packets do not need to be
protected by IPsec.
rule 2 permit icmp
Indicates that any ICMP packets need to be protected by
IPsec.
Rekey transport type Transport type of rekey messages: Multicast or Unicast.
Lifetime (sec) KEK lifetime, in seconds.
Encrypt algorithm KEK encryption algorithm.
Key size KEK key length.
Sig hash algorithm KEK signature hash algorithm.
Sig key length (bit) KEK signature key length, in bits.
Interface Name of the interface bound to the TEK.
Transform Transform set.










