end
Exits the current configuration mode and returns to the Exec mode.
Product
All
Privilege
Security Administrator, Administrator
Syntax
end
Usage Guidelines
Use this command to return to the Exec mode.
The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
The Crypto IPSec Map Manual Configuration Mode is used to configure static IPSec tunnel properties.
Modification(s) to an existing crypto map manual configuration will not take effect until the related security association has been cleared. Refer to the description of the clear crypto security-association command in the Exec Mode Commands chapter for more information.
Important |
Because manual crypto map configurations require the use of static security keys (associations), they are not as secure as crypto maps that rely on dynamically configured keys. Therefore, they only be used for testing purposes. |
Exec > Global Configuration > Context Configuration > Crypto Map Manual Configuration
configure > context context_name > crypto map map_name ipsec-manual
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-crypto-manual-map)#
Important |
The commands or keywords/variables that are available are dependent on platform type, product version, and installed license(s). |
Exits the current configuration mode and returns to the Exec mode.
All
Security Administrator, Administrator
end
Use this command to return to the Exec mode.
Exits the current mode and returns to the parent configuration mode.
All
Security Administrator, Administrator
exit
Use this command to return to the parent configuration mode.
Matches or associates the crypto map to an access control list (ACL) configured in the same context.
Important |
HNBGW is not supported from Release 20 and later, and HeNBGW is not supported in Releases 20, 21.0 and 21.1. This command must not be used for HNBGW and HeNBGW in these releases. For more information, contact your Cisco account representative. |
ePDG
FA
GGSN
HA
HeNBGW
HNBGW
HSGW
MME
P-GW
PDSN
S-GW
SAEGW
SCM
SecGW
SGSN
Security Administrator
Exec > Global Configuration > Context Configuration > Crypto Map Manual Configuration
configure > context context_name > crypto map map_name ipsec-manual
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-crypto-manual-map)#
[ no ] match address acl_name [ priority ]
Removes a previously matched ACL.
Specifies the name of the ACL with which the crypto map is to be matched. acl_name is an alphanumeric string of 1 through 47 characters that is case sensitive.
Specifies the preference of the ACL. The ACL preference is factored when a single packet matches the criteria of more than one ACL. priority is an integer from 0 through 4294967295. 0 is the highest priority. Default: 0
Important |
The priorities are only compared for ACLs matched to other crypto maps or to policy ACLs (those applied to the entire context). |
ACLs matched to crypto maps are referred to as crypto ACLs. Crypto ACLs define the criteria that must be met in order for a subscriber data packet to routed over an IPSec tunnel.
Prior to routing, the system examines the properties of each subscriber data packet. If the packet properties match the criteria specified in the crypto ACL, the system will initiate the IPSec policy dictated by the crypto map.
match address ACLlist1 0
Controls the Don't Fragment (DF) bit in the outer IP header of the IPSec tunnel data packet.
Important |
HNBGW is not supported from Release 20 and later, and HeNBGW is not supported in Releases 20, 21.0 and 21.1. This command must not be used for HNBGW and HeNBGW in these releases. For more information, contact your Cisco account representative. |
ePDG
FA
GGSN
HA
HeNBGW
HNBGW
HSGW
MME
P-GW
PDSN
S-GW
SAEGW
SCM
SecGW
SGSN
Security Administrator, Administrator
Exec > Global Configuration > Context Configuration > Crypto Map Manual Configuration
configure > context context_name > crypto map map_name ipsec-manual
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-crypto-manual-map)#
[ default ] set control-dont-fragment { clear-bit | copy-bit | set-bit }
Sets or restores default value assigned to a specified parameter.
Clears the DF bit from the outer IP header (sets it to 0).
Copies the DF bit from the inner IP header to the outer IP header. This is the default action.
Sets the DF bit in the outer IP header (sets it to 1).
Use this command to clear, copy, or set the don't fragment (DF) bit in the outer IP header of the IPSec tunnel data packet.
set control-dont-fragment set-bit
Configures the IPv4 Maximum Transmission Unit (MTU) in bytes.
ePDG
FA
GGSN
HA
HeNBGW
HNBGW
HSGW
MME
P-GW
PDSN
S-GW
SAEGW
SCM
SecGW
SGSN
Security Administrator, Administrator
Exec > Global Configuration > Context Configuration > Crypto Map Manual Configuration
configure > context context_name > crypto map map_name ipsec-manual
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-crypto-manual-map)#
ip mtu bytes
Specifies the IPv4 MTU in bytes as an integer from 576 to 2048. Default is 1438.
Use this command to set the IPv4 MTU in bytes
set ip mtu 1024
Configures the IPv6 Maximum Transmission Unit (MTU) in bytes.
ePDG
FA
GGSN
HA
HeNBGW
HNBGW
HSGW
MME
P-GW
PDSN
S-GW
SAEGW
SCM
SecGW
SGSN
Security Administrator, Administrator
Exec > Global Configuration > Context Configuration > Crypto Map Manual Configuration
configure > context context_name > crypto map map_name ipsec-manual
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-crypto-manual-map)#
ipv6 mtu bytes
Specifies the IPv6 MTU in bytes as an integer from 576 to 2048. Default is 1438.
Use this command to set the IPv6 MTU in bytes
set ip mtu 1024
Configures the IP address of the peer security gateway that the system will establish the IPSec tunnel with.
Important |
HNBGW is not supported from Release 20 and later, and HeNBGW is not supported in Releases 20, 21.0 and 21.1. This command must not be used for HNBGW and HeNBGW in these releases. For more information, contact your Cisco account representative. |
ePDG
FA
GGSN
HA
HeNBGW
HNBGW
HSGW
MME
P-GW
PDSN
S-GW
SAEGW
SCM
SecGW
SGSN
Security Administrator, Administrator
Exec > Global Configuration > Context Configuration > Crypto Map Manual Configuration
configure > context context_name > crypto map map_name ipsec-manual
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-crypto-manual-map)#
[ no ] set peer gw_address
Removes a previously configured peer address.
Specifies the IP address of the peer security gateway with which the IPSec tunnel will be established. The IP address can be in IPv4 dotted-decimal or IPv6 colon-separated-hexadecimal notation.
Once the manual crypto map is fully configured and applied to an interface, the system will establish an IPSec tunnel with the security gateway specified by this command.
Because the tunnel relies on statically configured parameters, once created, it never expires; it exists until its configuration is deleted.
set peer 192.168.1.100
Configures session key parameters for the manual crypto map.
Important |
HNBGW is not supported from Release 20 and later, and HeNBGW is not supported in Releases 20, 21.0 and 21.1. This command must not be used for HNBGW and HeNBGW in these releases. For more information, contact your Cisco account representative. |
ePDG
FA
GGSN
HA
HeNBGW
HNBGW
HSGW
MME
P-GW
PDSN
S-GW
SAEGW
SCM
SecGW
SGSN
Security Administrator, Administrator
Exec > Global Configuration > Context Configuration > Crypto Map Manual Configuration
configure > context context_name > crypto map map_name ipsec-manual
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-crypto-manual-map)#
set session-key { inbound | outbound } { ah ah_spi [ encrypted ] key ah_key | esp esp_spi [ encrypted ] cipher encryption_key [ encrypted ] authenticator auth_key }
no set session-key { inbound | outbound }
Removes previously configured session key information.
Specifies that the key(s) will be used for tunnels carrying data sent by the security gateway.
Specifies that the key(s) will be used for tunnels carrying data sent by the system.
Configures the Security Parameter Index (SPI) for the Authentication Header (AH) protocol. The SPI is used to identify the AH security association (SA) between the system and the security gateway. ah_spi is an integer from 256 through 4294967295.
Indicates the key provided is encrypted.
The encrypted keyword is intended only for use by the system while saving configuration scripts. The system displays the encrypted keyword in the configuration file as a flag that the variable following the key , cipher , and/or authenticator keyword is the encrypted version of the plain text key. Only the encrypted key is saved as part of the configuration file.
Configures the key used by the system to de/encapsulate IP packets using Authentication Header (AH) protocol. ah_key must be entered as either an alphanumeric string or a hexadecimal number beginning with "0x".
The length of the configured key must match the configured algorithm.
Configures SPI for the Encapsulating Security Payload (ESP) protocol. The SPI is used to identify the ESP security association (SA) between the system and the security gateway. esp_spi is an integer from 256 through 4294967295.
The length of the configured key must match the configured algorithm.
Specifies the key used by the system to de/encrypt the payloads of IP packets using the ESP protocol. encryption_key must be entered as either an alphanumeric string or a hexadecimal number beginning with "0x".
The length of the configured key must match the configured algorithm.
Specifies the key used by the system to authenticate the IP packets once encryption has been performed. auth_key must be entered as either an alphanumeric string or a hexadecimal number beginning with "0x".
The length of the configured key must match the configured algorithm.
Manual crypto maps rely on the use of statically configured keys to establish IPSec tunnels. This command allows the configuration of the static keys.
Identical keys must be configured on both the system and the security gateway in order for the tunnel to be established.
The length of the configured key must match the configured algorithm.
This command can be entered up to two time for the same crypto map: once to configure inbound key properties, and once to configure outbound key properties.
Keys are for tunnels initiated by the system to the security gateway.
ESP will be used with an SPI of 310 .
Encryption key is sd23r9skd0fi3as .
Authentication key is sfd23408imi9yn .
set session-key outbound esp 310 cipher sd23r9skd0fi3as authenticator sfd23408imi9yn
Configures the name of a transform set that the crypto map is associated with.
Important |
HNBGW is not supported from Release 20 and later, and HeNBGW is not supported in Releases 20, 21.0 and 21.1. This command must not be used for HNBGW and HeNBGW in these releases. For more information, contact your Cisco account representative. |
ePDG
FA
GGSN
HA
HeNBGW
HNBGW
HSGW
MME
P-GW
PDSN
S-GW
SAEGW
SCM
SecGW
SGSN
Security Administrator, Administrator
Exec > Global Configuration > Context Configuration > Crypto Map Manual Configuration
configure > context context_name > crypto map map_name ipsec-manual
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-crypto-manual-map)#
[ no ] set transform-set transform_name
Removes a previously configured transform set association.
Specifies the name of the transform set expressed as an alphanumeric string of 1 through 127 characters that is case sensitive.
System transform sets contain the IPSec policy definitions for crypto maps. Refer to the crypto ipsec transform-set command for information on creating transform sets.
Important |
Transform sets must be configured prior to configuring session key information for the crypto map. |
set transform-set esp_tset