355 
Usage guidelines 
This command displays the configuration information about all IKE proposals in descending order of 
proposal priorities. If no IKE proposal is configured, the command displays the default IKE proposal. 
Examples 
# Display the configuration information about all IKE proposals. 
<Sysname> display ike proposal 
 Priority Authentication Authentication Encryption  Diffie-Hellman Duration 
              method       algorithm    algorithm       group      (seconds) 
---------------------------------------------------------------------------- 
 1        RSA-SIG            SHA1        DES-CBC     Group 1        5000 
 11       PRE-SHARED-KEY     SHA1        DES-CBC     Group 1        50000 
 default  PRE-SHARED-KEY     SHA1       DES-CBC     Group 1        86400 
Table 45 Command output 
Field Description 
Priority  Priority of the IKE proposal 
Authentication method  Authentication method used by the IKE proposal. 
Authentication algorithm 
Authentication algorithm used in the IKE proposal:  
•  MD5—HMAC-MD5 algorithm. 
•  SHA1—HMAC-SHA1 algorithm. 
Encryption algorithm 
Encryption algorithm used by the IKE proposal: 
•  3DES-CBC—168-bit 3DES algorithm in CBC mode. 
•  AES-CBC-128—128-bit AES algorithm in CBC mode. 
•  AES-CBC-192—192-bit AES algorithm in CBC mode. 
•  AES-CBC-256—256-bit AES algorithm in CBC mode. 
•  DES-CBC—56-bit DES algorithm in CBC mode. 
Diffie-Hellman group  DH group used in IKE negotiation phase 1. 
Duration (seconds)  IKE SA lifetime (in seconds) of the IKE proposal 
 
Related commands 
ike proposal 
display ike sa 
Use display ike sa to display information about the current IKE SAs. 
Syntax 
display ike sa [ verbose [ connection-id  connection-id | remote-address [ ipv6  ]  remote-address 
[ vpn-instance vpn-name ] ] ] 
Views 
Any view 
Predefined user roles 
network-admin