end
Exits the current configuration mode and returns to the Exec mode.
Product
All
Privilege
Security Administrator, Administrator
Syntax
end
Usage Guidelines
Use this command to return to the Exec mode.
The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
The Crypto Group Configuration Mode is used to configure crypto (tunnel) groups that provide fail-over redundancy for IPSec tunnels to packet data networks (PDNs).
Exec > Global Configuration > Context Configuration > Crypto Group Configuration
configure > context context_name > crypto group group_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-crypto-grp)#
Important |
The commands or keywords/variables that are available are dependent on platform type, product version, and installed license(s). |
Exits the current configuration mode and returns to the Exec mode.
All
Security Administrator, Administrator
end
Use this command to return to the Exec mode.
Exits the current mode and returns to the parent configuration mode.
All
Security Administrator, Administrator
exit
Use this command to return to the parent configuration mode.
Associates an access control list (ACL) with the crypto group.
Important |
HNBGW is not supported from Release 20 and later, and HeNBGW is not supported in Releases 20, 21.0 and 21.1. This command must not be used for HNBGW and HeNBGW in these releases. For more information, contact your Cisco account representative. |
ePDG
FA
GGSN
HA
HeNBGW
HNBGW
HSGW
MME
P-GW
PDSN
S-GW
SAEGW
SCM
SecGW
SGSN
Security Administrator, Administrator
Exec > Global Configuration > Context Configuration > Crypto Group Configuration
configure > context context_name > crypto group group_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-crypto-grp)#
[ no ] match address acl_name [ preference ]
Deletes a previously configured ACL association.
Specifies the name of the ACL being matched to the crypto group entered as an alphanumeric string of 1 through 47 characters.
The priority of the ACL.
The ACL preference is factored when a single packet matches the criteria of more than one ACL. preference is an integer from 0 through 4294967295; 0 is the highest priority.
If multiple ACLs are assigned the same priority, the last one entered will be used first.
Important |
The priorities are only compared for ACLs matched to other groups or to policy ACLs (those applied to the entire context). |
IP ACLs are associated with crypto groups using this command. Both the crypto group and the ACLs must be configured in the same context.
ISAKMP crypto maps can then be associated with the crypto group. This allows user traffic matching the rules of the ACL to be handled according to the policies configured as part of the crypto map.
match address corporate_acl
Matches the specified IP pool to the current crypto group. This command can be used multiple times to match more than one IP pool.
Important |
HNBGW is not supported from Release 20 and later, and HeNBGW is not supported in Releases 20, 21.0 and 21.1. This command must not be used for HNBGW and HeNBGW in these releases. For more information, contact your Cisco account representative. |
Important |
The match ip pool command is not supported within a crypto group on the ASR 5500 platform. |
ePDG
FA
GGSN
HA
HeNBGW
HNBGW
HSGW
MME
P-GW
PDSN
S-GW
SAEGW
SCM
SecGW
SGSN
Security Administrator, Administrator
Exec > Global Configuration > Context Configuration > Crypto Group Configuration
configure > context context_name > crypto group group_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-crypto-grp)#
[ no ] match ip pool pool-name pool_name
Deletes the matching statement for the specified IP pool from the crypto group.
Specifies the name of an existing IP pool that should be matched entered as an alphanumeric string of 1 through 31 characters.
Use this command to set the names of IP pools that should be matched in the current crypto group.
match ip pool pool-name ippool1
Configures the fail-over properties for the crypto group as part of the Redundant IPSec Fail-Over feature.
Important |
HNBGW is not supported from Release 20 and later, and HeNBGW is not supported in Releases 20, 21.0 and 21.1. This command must not be used for HNBGW and HeNBGW in these releases. For more information, contact your Cisco account representative. |
ePDG
FA
GGSN
HA
HeNBGW
HNBGW
HSGW
MME
P-GW
PDSN
S-GW
SAEGW
SCM
SecGW
SGSN
Security Administrator, Administrator
Exec > Global Configuration > Context Configuration > Crypto Group Configuration
configure > context context_name > crypto group group_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-crypto-grp)#
[ no ] switchover auto [ do-not-revert ]
Disables the automatic switchover of tunnels. This applies to switching primary-to-secondary and secondary-to-primary.
Allows the automatic switchover of tunnels. Default: Enabled
Disables the automatic switchover of secondary tunnels to primary tunnels. Default: Disabled
This command configures the fail-over options for the Redundant IPSec Fail-over feature.
If the automatic fail-over options are disabled, tunneled traffic must be manually switched to the alternate tunnel (or manually activated if no alternate tunnel is configured and available) using the following command in the Exec Mode:
crypto-group group_name activate { primary | secondary }
For a definition of this command, see the crypto-group section of the Exec Mode Commands chapter of this guide.
switchover auto do-not-revert