How to Implement General IPSec Configurations for IPSec Networks
Command or Action
Step 2
crypto ipsec security-association idle-time seconds
Example:
RP/0/0/CPU0:router(config)# crypto ipsec
security-association idle-time 600
Step 3
end
or
commit
Example:
RP/0/0/CPU0:router(config)# end
or
RP/0/0/CPU0:router(config)# commit
Configuring the IPSec SA Idle Timer for Each Crypto Profile
This task configures the IPSec SA idle timer for a specified crypto profile. The idle timer configuration
is applied to all SAs under the specified crypto profile. If no idle time is specified under the profile and
idle time is configured in global mode, the idle time of the global mode is applied.
SUMMARY STEPS
1.
2.
3.
4.
Cisco IOS XR System Security Configuration Guide
SC-122
configure
crypto ipsec profile name
set security-association idle-time seconds
end
or
commit
Implementing IPSec Network Security on Cisco IOS XR Software
Purpose
Configures the IPSec SA idle timer globally.
Use the seconds argument to specify the time, in
•
seconds, that the idle timer allows an inactive
peer to maintain an SA. Valid values for the
seconds argument range from 600 to 86400.
Saves configuration changes.
When you issue the end command, the system
•
prompts you to commit changes:
Uncommitted changes found, commit them
before exiting(yes/no/cancel)?
[cancel]:
–
Entering yes saves configuration changes to
the running configuration file, exits the
configuration session, and returns the
router to EXEC mode.
Entering no exits the configuration session
–
and returns the router to EXEC mode
without committing the configuration
changes.
Entering cancel leaves the router in the
–
current configuration session without
exiting or committing the configuration
changes.
Use the commit command to save the
•
configuration changes to the running
configuration file and remain within the
configuration session.