end
Exits the current configuration mode and returns to the Exec mode.
Product
All
Privilege
Security Administrator, Administrator
Syntax
end
Usage Guidelines
Use this command to return to the Exec mode.
The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
Modification(s) to an existing dynamic crypto map configuration will not take effect until the related security association has been cleared. Refer to the description of the clear crypto security-association command in the Exec Mode Commands chapter for more information.
The Crypto Map IPSec Dynamic Configuration Mode is used to configure IPSec tunnels that are created as needed to facilitate subscriber sessions using Mobile IP or L2TP.
Exec > Global Configuration > Context Configuration > Crypto Map Dynamic Configuration
configure > context context_name > crypto map policy_name ipsec-dynamic
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-crypto-dynamic-map)#
Important |
The commands or keywords/variables that are available are dependent on platform type, product version, and installed license(s). |
Exits the current configuration mode and returns to the Exec mode.
All
Security Administrator, Administrator
end
Use this command to return to the Exec mode.
Exits the current mode and returns to the parent configuration mode.
All
Security Administrator, Administrator
exit
Use this command to return to the parent configuration mode.
Configures parameters for the dynamic crypto map.
Important |
HNBGW is not supported from Release 20 and later, and HeNBGW is not supported in Releases 20, 21.0 and 21.1. This command must not be used for HNBGW and HeNBGW in these releases. For more information, contact your Cisco account representative. |
ePDG
FA
GGSN
HA
HeNBGW
HNBGW
HSGW
MME
P-GW
PDSN
S-GW
SAEGW
SCM
SecGW
SGSN
Security Administrator, Administrator
Exec > Global Configuration > Context Configuration > Crypto Map Dynamic Configuration
configure > context context_name > crypto map policy_name ipsec-dynamic
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-crypto-dynamic-map)#
set { control-dont-fragment { clear-bit | copy-bit | set-bit } | ikev1 natt [ keepalive sec ] | ip mtu bytes | pfs { group1 | group2 | group5} | phase1-idtype { id-key-id | ipv4-address } [ mode { aggressive | main } ] | phase2-idtype { ipv4-address | ipv4-address-subnet} | security-association lifetime { keepalive | kilo-bytes kbytes | seconds secs } | transform-set transform_name [ transform-set transform_name2 ... transform-set transform_name6 ] }
no set { ikev1 natt | pfs | security-association lifetime {keepalive | kilo-bytes | seconds } | phase1-idtype | phase2-idtype | transform-set transform_name [ transform-set transform_name2 ... transform-set transform_name6 ] }
Deletes the specified parameter or resets the specified parameter to the default value.
Enables IPSec NAT Traversal.
keepalive sec : The time to keep the NAT connection alive in seconds. sec must be an integer of from 1 through 3600.
Specifies the IP Maximum Transmission Unit (MTU) in bytes as an integer from 576 to 2048.
Configures the IKE negotiation mode as AGRESSIVE or MAIN.
Sets the IKE negotiations Phase 1 payload identifier.
Default: ipv4-address
id-key-id : Use ID_KEY_ID as the Phase 1 payload identifier.
ipv4-address : Use IPV4_ADDR as the Phase 1 payload identifier.
mode { aggressive | main } : Specify the IKE mode.
Sets the IKE negotiations Phase 2 payload identifier.
Default: ipv4-address-subnet
ipv4-address : Use IPV4_ADDR as the Phase 2 payload identifier.
ipv4-address-subnet : Use IPV4_ADDR_SUBNET as the Phase 2 payload identifier.
keepalive : Disabled
kilo-bytes : 4608000 kbytes
seconds : 28800 seconds
keepalive : The SA lifetime expires only when a keepalive message is not responded to by the far end.
kilo-bytes : This specifies the amount of data in kilobytes to allow through the tunnel before the SA lifetime expires; entered as an integer from 2560 through 4294967294.
seconds : The number of seconds to wait before the SA lifetime expires; entered as an integer from 1200 through 86400.
Important |
If the dynamic crypto map is being used in conjunction with Mobile IP and the Mobile IP renewal timer is less than the crypto map's SA lifetime (either in terms of kilobytes or seconds), then the keepalive parameter must be configured. |
Specifies the name of a transform set configured in the same context that will be associated with the crypto map. Refer to the command crypto ipsec transform-set for information on creating transform sets.
You can repeat this keyword up to 6 times on the command line to specify multiple transform sets.
trasnform_name is the name of the transform set entered as an alphanumeric string from 1 through 127 characters that is case sensitive.
Use this command to set parameters for a dynamic crypto map.
set pfs group1
set security-association lifetime kilo-bytes 50000
set security-association lifetime seconds 10000
set security-association lifetime keepalive
set transform-set tset1 transform-set tset2