- Table of Contents
-
- 09-Security Configuration Guide
- 00-Preface
- 01-AAA configuration
- 02-802.1X configuration
- 03-MAC authentication configuration
- 04-Portal configuration
- 05-Web authentication configuration
- 06-Triple authentication configuration
- 07-Port security configuration
- 08-User profile configuration
- 09-Password control configuration
- 10-Public key management
- 11-PKI configuration
- 12-IPsec configuration
- 13-SSH configuration
- 14-SSL configuration
- 15-Attack detection and prevention configuration
- 16-TCP attack prevention configuration
- 17-IP source guard configuration
- 18-ARP attack protection configuration
- 19-ND attack defense configuration
- 20-SAVI configuration
- 21-MFF configuration
- 22-Crypto engine configuration
- 23-FIPS configuration
- 24-802.1X client configuration
- Related Documents
-
Title | Size | Download |
---|---|---|
22-Crypto engine configuration | 37.90 KB |
Configuring crypto engines
About crypto engines
Crypto engines encrypt and decrypt data for service modules.
The device supports only one software crypto engine, which is a set of software encryption algorithms. The software crypto engine is always enabled.
When a service module requires data encryption/decryption, it sends the desired data to the crypto engine. After the crypto engine completes data encryption/decryption, it sends the data back to the service module.
Display and maintenance commands for crypto engines
Execute display commands in any view and reset commands in user view.
Task |
Command |
Display crypto engine information. |
display crypto-engine |
Display crypto engine statistics. |
display crypto-engine statistics [ engine-id engine-id slot slot-number ] |
Clear crypto engine statistics. |
reset crypto-engine statistics [ engine-id engine-id slot slot-number ] |