- Table of Contents
 - 
                        
- 08-Security Configuration Guide
 - 00-Preface
 - 01-AAA configuration
 - 02-802.1X configuration
 - 03-MAC authentication configuration
 - 04-Portal configuration
 - 05-Web authentication configuration
 - 06-Triple authentication configuration
 - 07-Port security configuration
 - 08-User profile configuration
 - 09-Password control configuration
 - 10-Public key management
 - 11-PKI configuration
 - 12-IPsec configuration
 - 13-SSH configuration
 - 14-SSL configuration
 - 15-Attack detection and prevention configuration
 - 16-TCP attack prevention configuration
 - 17-IP source guard configuration
 - 18-ARP attack protection configuration
 - 19-ND attack defense configuration
 - 20-SAVI configuration
 - 21-MFF configuration
 - 22-Crypto engine configuration
 - 23-FIPS configuration
 - 24-802.1X client configuration
 
 
- Related Documents
 - 
                        
 
| Title | Size | Download | 
|---|---|---|
| 22-Crypto engine configuration | 31.08 KB | 
Configuring crypto engines
About crypto engines
Crypto engines encrypt and decrypt data for service modules.
The device supports only one software crypto engine, which is a set of software encryption algorithms. The software crypto engine is always enabled.
When a service module requires data encryption/decryption, it sends the desired data to the crypto engine. After the crypto engine completes data encryption/decryption, it sends the data back to the service module.
Display and maintenance commands for crypto engines
Execute display commands in any view and reset commands in user view.
| 
    Task  | 
   
    Command  | 
  
 
| 
   Display crypto engine information.  | 
  
   display crypto-engine  | 
 
 
| 
   Display crypto engine statistics.  | 
  
   display crypto-engine statistics [ engine-id engine-id slot slot-number ]  | 
 
 
| 
   Clear crypto engine statistics.  | 
  
   reset crypto-engine statistics [ engine-id engine-id slot slot-number ]  | 
 

