- Table of Contents
-
- 12-Security Configuration Guide
- 00-Preface
- 01-ARP attack protection configuration
- 02-Attack detection and prevention configuration
- 03-Crypto engine configuration
- 04-DAE proxy configuration
- 05-IP-based attack prevention configuration
- 06-IPsec configuration examples
- 07-IPsec configuration
- 08-IP source guard configuration
- 09-Keychain configuration
- 10-ND attack defense configuration
- 11-Object group configuration
- 12-Password control configuration
- 13-PKI configuration
- 14-Public key management
- 15-SAVA configuration
- 16-SAVNET configuration
- 17-Session management
- 18-SSH configuration
- 19-SSL configuration
- 20-Trust level configuration
- 21-uRPF configuration
- Related Documents
-
| Title | Size | Download |
|---|---|---|
| 03-Crypto engine configuration | 47.98 KB |
Configuring crypto engines
Overview
Crypto engines encrypt and decrypt data for service modules.
Crypto engine types
Crypto engines include the following types:
· Hardware crypto engines—A hardware crypto engine is a coprocessor integrated on a CPU or hardware crypto card. Hardware crypto engines can accelerate encryption/decryption speed, which improves device processing efficiency. You can enable or disable hardware crypto engines globally as needed. By default, hardware crypto engines are enabled.
· Software crypto engines—A software crypto engine is a set of software encryption algorithms. The device uses software crypto engines to encrypt and decrypt data for service modules. They are always enabled. You cannot enable or disable software crypto engines.
Crypto engine processing mechanism
If you disable hardware crypto engines, the device uses only software crypto engines for data encryption/decryption. If you enable hardware crypto engines, the device preferentially uses hardware crypto engines. If the device does not support hardware crypto engines, or if the hardware crypto engines do not support the required encryption algorithm, the device uses software crypto engines for data encryption/decryption.
Crypto engines provide encryption/decryption services for service modules, for example, the IPsec module. When a service module requires data encryption/decryption, it sends the desired data to a crypto engine. After the crypto engine completes data encryption/decryption, it sends the data back to the service module.
Display and maintenance commands for crypto engines
Execute display commands in any view and reset commands in user view.
|
Task |
Command |
|
Display crypto engine information. |
display crypto-engine |
|
Display crypto engine statistics. |
display crypto-engine statistics [ engine-id engine-id slot slot-number ] |
|
Clear crypto engine statistics. |
reset crypto-engine statistics [ engine-id engine-id slot slot-number ] |
