< Home

display ipsec proposal

Function

The display ipsec proposal command displays IPSec proposal information.

Format

display ipsec proposal [ name proposal-name ]

Parameters

Parameter Description Value

name proposal-name

Specifies the name of an IPSec proposal.

The value is an existing name of an IPSec proposal.

Views

All views

Default Level

1: Monitoring Level

Usage Guidelines

After IPSec is configured, when valid packets are dropped between IPSec peers, you can run the display ipsec proposal command to check whether the IPSec proposal configurations on both IPSec peers are identical.

IPSec ensures security using the IPSec proposal. You can run the display ipsec proposal command to view the following information:

  • Name of the IPSec proposal

  • Encapsulation mode defined in the IPSec proposal

  • Security protocol defined in the IPSec proposal

  • Authentication and encryption algorithms defined in the IPSec proposal

Example

# Display information about all IPSec proposals.

<HUAWEI> display ipsec proposal
  Total IP security proposal number: 1

  IP security proposal name: proposal1
    encapsulation mode: transport
    transform: esp-new
    ESP protocol: authentication SHA2-HMAC-256, encryption AES-192
Table 1 Description of the display ipsec proposal command output

Item

Description

Total IP security proposal number

Number of IPSec proposals created.

IP security proposal name

Name of an IPSec proposal. To configure an IPSec proposal, run the ipsec proposal command.

encapsulation mode

IPSec encapsulation mode:

  • transport
  • tunnel

To configure an encapsulation mode, run the encapsulation-mode command.

transform

Security protocol defined in the security proposal:

  • esp-new: ESP
  • ah-new: AH

To configure a security protocol, run the transform command.

ESP protocol

The authentication algorithm and encryption algorithm used by the ESP protocol.

To configure the authentication algorithm and encryption algorithm, run the esp authentication-algorithm and esp encryption-algorithm command separately.

AH protocol

To configure an authentication algorithm used by the AH protocol, run the ah authentication-algorithm command.

Copyright © Huawei Technologies Co., Ltd.
Copyright © Huawei Technologies Co., Ltd.
< Previous topic Next topic >