end
Exits the current configuration mode and returns to the Exec mode.
Product
All
Privilege
Security Administrator, Administrator
Syntax
end
Usage Guidelines
Use this command to return to the Exec mode.
The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
The Crypto Map IKEv2-IPv4 Payload Configuration Mode is used to assign the correct IPSec transform-set from a list of up to four different transform-sets, and to assign Mobile IP addresses.
Exec > Global Configuration > Context Configuration > Crypto Map IKEv2-IPv4 > Crypto Map IKEv2-IPv4 Payload Configuration
configure > context context_name > crypto map map_name ikev2-ipv4 > payload payload_name match ipv4
Entering the above command sequence results in the following prompt:
[context_name]host_name(cfg-crypto-ikev2-ipv4-payload)#
Important |
The commands or keywords/variables that are available are dependent on platform type, product version, and installed license(s). |
Exits the current configuration mode and returns to the Exec mode.
All
Security Administrator, Administrator
end
Use this command to return to the Exec mode.
Exits the current mode and returns to the parent configuration mode.
All
Security Administrator, Administrator
exit
Use this command to return to the parent configuration mode.
Configures the IPSec transform set to be used for this crypto template payload.
Important |
HNBGW is not supported from Release 20 and later, and HeNBGW is not supported in Releases 20, 21.0 and 21.1. This command must not be used for HNBGW and HeNBGW in these releases. For more information, contact your Cisco account representative. |
ePDG
FA
GGSN
HA
HeNBGW
HNBGW
HSGW
MME
P-GW
PDSN
S-GW
SAEGW
SCM
SecGW
SGSN
Security Administrator
ipsec transform-set list transform_set_name transform_set_name transform_set_name transform_set_name
no ipsec transform-set list
Specifies the context -level IKEv2 IPSec Child Security Association (SA) transform sets to be used in the crypto template payload. This is a space-separated list. Up to four transform sets can be entered. transform_set_name is an alphanumeric string of 1 through 127 characters.
Use this command to list the IPSec transform set(s) to use in this crypto template payload.
ipsec transform-set list ipset1 ipset2
Configures the number of seconds and/or kilobytes for IPSec Child SAs derived from this crypto template payload to exist.
Important |
HNBGW is not supported from Release 20 and later, and HeNBGW is not supported in Releases 20, 21.0 and 21.1. This command must not be used for HNBGW and HeNBGW in these releases. For more information, contact your Cisco account representative. |
ePDG
FA
GGSN
HA
HeNBGW
HNBGW
HSGW
MME
P-GW
PDSN
S-GW
SAEGW
SCM
SecGW
SGSN
Security Administrator
lifetime { sec [ kilo-bytes kbytes ] | kilobytes kbytes }
default lifetime
Returns the lifetime value to the default setting of 86400 seconds.
Specifies the number of seconds for IPSec Child Security Associations derived from this crypto template payload to exist. sec must be an integer from 60 through 604800. Default: 86400
Specifies lifetime in kilobytes for IPSec Child Security Associations derived from this Crypto Map. kbytes must be an integer from 1 through 2147483648.
Use this command to configure the number of seconds and/or kilobytes for IPSec Child Security Associations derived from this crypto template payload to exist.
lifetime 120
Configures child security association rekeying.
Important |
In Release 20 and later, HNBGW is not supported. This command must not be used for HNBGW in Release 20 and later. For more information, contact your Cisco account representative. |
ePDG
FA
FNG
GGSN
HA
HNBGW
P-GW
PDSN
SAEGW
SCM
SGSN
Security Administrator
rekey [ keepalive ]
[ default | no ] rekey
Returns the feature to the default setting of disabled.
Disables this feature.
If specified, a session will be rekeyed even if there has been no data exchanged since the last rekeying operation. By default rekeying is only performed if there has been data exchanged since the previous rekey.
Use this command to enable or disable the ability to rekey IPSec Child SAs after approximately 90% of the Child SA lifetime has expired. The default, and recommended setting, is not to perform rekeying. No rekeying means the P-GW will not originate rekeying operations and will not process CHILD SA rekeying requests from the MS.
no rekey