dhcp-peer

crypto-remote-vpn-client commands

Configures DHCP peer‘s local ID and authentication settings

Supported in the following platforms:

  • Access Points — AP505i, AP510i/e, AP560i/h
  • Service Platforms — NX5500, NX7500, NX9500, NX9600, VX9000

Syntax

dhcp-peer [authentication|localid]
dhcp-peer authentication [psk [0 <WORD>|2 <WORD>|<WORD>]|rsa]
dhcp-peer localid [autogen-uniqueid <WORD>|string <WORD>]

Parameters

dhcp-peer authentication [psk [0 <WORD>|2 <WORD>|<WORD>]|rsa]
dhcp-peer authentication psk [0 <WORD>| 2 <WORD>| <WORD>] Configures the DHCP peer‘s authentication type as PSK
  • 0 <WORD> – Configures a clear text authentication key
  • 2 <WORD> – Configures an encrypted authentication key
  • <WORD> – Provide a 8 - 21 character shared key password for DHCP peer authentication
dhcp-peer authentication rsa Configures the DHCP peer‘s authentication type as RSA. This is the default setting.
dhcp-peer localid [autogen-uniqueid <WORD>|string <WORD>]
dhcp-peer localid [autogen-uniqueid <WORD>| string <WORD>] Configures the DHCP peer's localid using one of the following options:
  • autogen-uniqueid - Generates a localid using the device's unique identity. The system prefixes the device's unique identity to the string provided here. The device‘s unique identity should be existing and configured. For more information on configuring a device‘s unique identity, see autogen-uniqueid.
    • <WORD> – Provide the string.
  • string - Uses the value provided here as the DHCP peer‘s localid.
    • <WORD> - Provide the string.

Example

rfs4000-229D58(config-profile-testRFS4000-crypto-ikev2-remote-vpn-client)#dhcp-peer authentication psk 0 @123testing

rfs4000-229D58(config-profile-testRFS4000-crypto-ikev2-remote-vpn-client)#show context
 crypto remote-vpn-client
  dhcp-peer authentication psk 0 @123testing
rfs4000-229D58(config-profile-testRFS4000-crypto-ikev2-remote-vpn-client)#