Configuration Mode Commands : SteelHead configuration commands : ip security authentication policy
  
ip security authentication policy
Sets the authentication algorithms in order of priority.
Syntax
ip security authentication policy <method-1> [<method 2>]
Parameters
<method-1>
Primary policy method:
hmac_md5 - Message-Digest algorithm 5 (MD5) is a widely-used cryptographic hash function with a 128-bit hash value. This is the default value.
hmac_sha1 - Secure Hash Algorithm (SHA1) is a set of related cryptographic hash functions. SHA-1 is considered to be the successor to MD5.
hmac_sha256 - HMAC-SHA256 is a type of keyed hash algorithm that is constructed from the SHA-256 hash function and used as a Hash-based Message Authentication Code (HMAC).
hmac_sha384 - HMA-SHA384 is a type of keyed hash algorithm that is constructed from the SHA-256 hash function and used as a HMAC.
hmac_sha512 - HMAC-SHA512 is a type of keyed hash algorithm that is constructed from the SHA-256 hash function and used as a HAMC.
<method-2>
Secondary policy method:
hmac_md5 - Message-Digest algorithm 5 (MD5) is a widely-used cryptographic hash function with a 128-bit hash value. This is the default value.
hmac_sha1 - Secure Hash Algorithm (SHA1) is a set of related cryptographic hash functions. SHA-1 is considered to be the successor to MD5.
hmac_sha256 - HMAC-SHA256 is a type of keyed hash algorithm that is constructed from the SHA-256 hash function and used as a Hash-based Message Authentication Code (HMAC).
hmac_sha384 - HMA-SHA384 is a type of keyed hash algorithm that is constructed from the SHA-256 hash function and used as a HMAC.
hmac_sha512 - HMAC-SHA512 is a type of keyed hash algorithm that is constructed from the SHA-256 hash function and used as a HAMC.
Usage
You must specify at least one algorithm. The algorithm is used to guarantee the authenticity of each packet.
Example
amnesiac (config) # ip security authentication policy hmac_md5
Product
SteelHead CX, SteelHead-v, SteelHead-c
Related Commands
show ip