end
Exits the current configuration mode and returns to the Exec mode.
Product
All
Privilege
Security Administrator, Administrator
Syntax
end
Usage Guidelines
Use this command to return to the Exec mode.
The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
The Crypto Map IKEv2-IPv6 Payload Configuration Mode is used to assign the correct IPSec transform-set from a list of up to four different transform-sets, and to assign Mobile IP addresses.
Exec > Global Configuration > Context Configuration > Crypto Map IKEv2-IPv6 Configuration > Crypto Map IKEv2-IPv6 Payload Configuration
configure > context context_name > crypto map map_name ikev2-ipv6 > payload payload_name match ipv6
Entering the above command sequence results in the following prompt:
[context_name]host_name(cfg-crypto-ikev2-ipv6-payload)#
Important |
The commands or keywords/variables that are available are dependent on platform type, product version, and installed license(s). |
Exits the current configuration mode and returns to the Exec mode.
All
Security Administrator, Administrator
end
Use this command to return to the Exec mode.
Exits the current mode and returns to the parent configuration mode.
All
Security Administrator, Administrator
exit
Use this command to return to the parent configuration mode.
Configures the IPSec transform sets to be used for this crypto map payload.
Important |
HNBGW is not supported from Release 20 and later, and HeNBGW is not supported in Releases 20, 21.0 and 21.1. This command must not be used for HNBGW and HeNBGW in these releases. For more information, contact your Cisco account representative. |
ePDG
FA
GGSN
HA
HeNBGW
HNBGW
HSGW
MME
P-GW
PDSN
S-GW
SAEGW
SCM
SecGW
SGSN
Security Administrator
Exec > Global Configuration > Context Configuration > Crypto Map IKEv2-IPv6 Configuration > Crypto Map IKEv2-IPv6 Payload Configuration
configure > context context_name > crypto map map_name ikev2-ipv6 > payload payload_name match ipv6
Entering the above command sequence results in the following prompt:
[context_name]host_name(cfg-crypto-ikev2-ipv6-payload)#
ipsec transform-set list transform_set_name [ transform_set_name ] [ transform_set_name ] [ transform_set_name ]
no ipsec transform-set list
Disables the transform set list.
Specifies the context-level name of the IKEv2 IPsec Child Security Association (SA) transform setto be used in the crypto map payload. This is a space-separated list. From 1 to 4 transform sets can be entered. transform_set_name is an alphanumeric string of 1 through 127 characters.
Use this command to list the IPSec transform set(s) to use in this crypto map payload.
ipsec transform-set list ipset1 ipset2
Configures the number of seconds and/or kilobytes for IPSec Child SAs derived from this crypto template payload to exist.
Important |
HNBGW is not supported from Release 20 and later, and HeNBGW is not supported in Releases 20, 21.0 and 21.1. This command must not be used for HNBGW and HeNBGW in these releases. For more information, contact your Cisco account representative. |
ePDG
FA
GGSN
HA
HeNBGW
HNBGW
HSGW
MME
P-GW
PDSN
S-GW
SAEGW
SCM
SecGW
SGSN
Administrator
Exec > Global Configuration > Context Configuration > Crypto Map IKEv2-IPv6 Configuration > Crypto Map IKEv2-IPv6 Payload Configuration
configure > context context_name > crypto map map_name ikev2-ipv6 > payload payload_name match ipv6
Entering the above command sequence results in the following prompt:
[context_name]host_name(cfg-crypto-ikev2-ipv6-payload)#
lifetime { sec [ kilo-bytes kbytes ] | kilobytes kbytes }
default lifetime
Returns the lifetime value to the default setting of 86400 seconds.
Specifies the number of seconds for IPSec Child Security Associations derived from this crypto template payload to exist. sec must be an integer from 60 through 604800. Default: 86400
Specifies lifetime in kilobytes for IPSec Child Security Associations derived from this Crypto Map. kbytes must be an integer from 1 through 2147483648.
Use this command to configure the number of seconds and/or kilobytes for IPSec Child Security Associations derived from this crypto template payload to exist.
lifetime 120
Configures child security association rekeying.
Important |
HNBGW is not supported from Release 20 and later, and HeNBGW is not supported in Releases 20, 21.0 and 21.1. This command must not be used for HNBGW and HeNBGW in these releases. For more information, contact your Cisco account representative. |
ePDG
FA
GGSN
HA
HeNBGW
HNBGW
HSGW
MME
P-GW
PDSN
S-GW
SAEGW
SCM
SecGW
SGSN
Security Administrator
Exec > Global Configuration > Context Configuration > Crypto Map IKEv2-IPv6 Configuration > Crypto Map IKEv2-IPv6 Payload Configuration
configure > context context_name > crypto map map_name ikev2-ipv6 > payload payload_name match ipv6
Entering the above command sequence results in the following prompt:
[context_name]host_name(cfg-crypto-ikev2-ipv6-payload)#
rekey [ keepalive ]
[ default | no ] rekey
Returns the feature to the default setting of disabled.
Disables this feature.
If specified, a session will be rekeyed even if there has been no data exchanged since the last rekeying operation. By default rekeying is only performed if there has been data exchanged since the previous rekey.
Use this command to enable or disable the ability to rekey IPSec Child SAs after approximately 90% of the Child SA lifetime has expired. The default, and recommended setting, is not to perform rekeying. No rekeying means the P-GW will not originate rekeying operations and will not process CHILD SA rekeying requests from the MS.
no rekey