The dh command specifies a Diffie-Hellman (DH) group used for IKE negotiation.
The undo dh command restores the default DH group for IKE negotiation.
By default, group14 is used for IKE negotiation.
Parameter | Description | Value |
---|---|---|
group14 |
Uses the 2048-bit DH group in IKE negotiation phase 1. |
- |
group19 |
Uses the 256-bit Elliptic Curve Groups modulo a Prime (ECP) DH group in IKE negotiation phase 1. |
- |
group20 |
Uses the 384-bit Elliptic Curve Groups modulo a Prime (ECP) DH group in IKE negotiation phase 1. |
- |
group21 |
Uses the 521-bit Elliptic Curve Groups modulo a Prime (ECP) DH group in IKE negotiation phase 1. |
- |
Usage Scenario
The DH algorithm is a public key algorithm. Two communicating parties calculate a shared key based on data exchanged between them, without transmitting the key. A third party (such as a hacker) cannot calculate the actual key even if it obtains all exchanged data for key calculation.
Precautions
Both ends of an IPSec tunnel must be configured with the same DH group. Otherwise, the negotiation fails.
The security level order of the DH groups is: group21 > group20 > group19 > group14.