Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

Signature Hash Algorithm (Security IKE)

Syntax

Hierarchy Level

Description

Defines the digital signature hash algorithms that must match with the received signature hash algorithms in the hierarchical order for IKEv2. If your device doesn't find a match, negotiation with the IKE peer fails. This configuration ensures that the peers negotiate a specific set of signature hash algorithms. Note that you cannot use the configuration statement with IKEv1.

If not configured, the default value is all the supported hash algorithms.

Options

sha1

Select SHA-1 signature hash algorithm.

sha256

Select SHA 256-bit signature hash algorithm.

sha384

Select SHA 384-bit signature hash algorithm.

sha512

Select SHA 512-bit signature hash algorithm.

Required Privilege Level

security—To view this statement in the configuration.

security-control—To add this statement to the configuration.

Release Information

Statement introduced in Junos OS Release 24.4R1.