- Table of Contents
-
- 12-Security Configuration Guide
- 00-Preface
- 01-Keychain configuration
- 02-Public key management
- 03-PKI configuration
- 04-Crypto engine configuration
- 05-SSH configuration
- 06-SSL configuration
- 07-Packet filter configuration
- 08-DHCP snooping configuration
- 09-DHCPv6 snooping configuration
- 10-ARP attack protection configuration
- 11-ND attack defense configuration
- 12-Attack detection and prevention configuration
- 13-IP-based attack prevention configuration
- 14-IP source guard configuration
- 15-uRPF configuration
- 16-MACsec configuration
- 17-TC configuration
- Related Documents
-
Title | Size | Download |
---|---|---|
04-Crypto engine configuration | 38.48 KB |
Crypto engine processing mechanism
Verifying and maintaining crypto engines
Displaying crypto engine information
Displaying and clearing crypto engine statistics
Configuring crypto engines
About crypto engines
Crypto engines encrypt and decrypt data for service modules.
Crypto engine processing mechanism
Crypto engines provide encryption/decryption services for service modules, for example, the IPsec module. When a service module requires data encryption/decryption, it sends the desired data to a crypto engine. After the crypto engine completes data encryption/decryption, it sends the data back to the service module.
Verifying and maintaining crypto engines
Displaying crypto engine information
To display crypto engine information, execute the following command in any view:
display crypto-engine
Displaying and clearing crypto engine statistics
To display crypto engine statistics, execute the following command in any view:
display crypto-engine statistics [ engine-id engine-id slot slot-number ]
To clear crypto engine statistics, execute the following command in user view:
reset crypto-engine statistics [ engine-id engine-id slot slot-number ]