- Table of Contents
-
- 13-Security Configuration Guide
- 00-Preface
- 01-ACL configuration
- 02-Time range configuration
- 03-User profile configuration
- 04-Public key management
- 05-PKI configuration
- 06-IPsec configuration
- 07-SSH configuration
- 08-Attack detection and prevention configuration
- 09-ARP attack protection configuration
- 10-ND attack defense configuration
- 11-Crypto engine configuration
- 12-Password control configuration
- Related Documents
-
Title | Size | Download |
---|---|---|
11-Crypto engine configuration | 38.32 KB |
1 Configuring crypto engines
About crypto engines
Crypto engines encrypt and decrypt data for service modules.
Crypto engine processing mechanism
Crypto engines provide encryption/decryption services for service modules, for example, the IPsec module. When a service module requires data encryption/decryption, it sends the desired data to a crypto engine. After the crypto engine completes data encryption/decryption, it sends the data back to the service module.
Display and maintenance commands for crypto engines
Execute display commands in any view and reset commands in user view.
Task |
Command |
Display crypto engine information. |
display crypto-engine |
Display crypto engine statistics. |
display crypto-engine statistics [ engine-id engine-id ] |
Clear crypto engine statistics. |
reset crypto-engine statistics [ engine-id engine-id ] |