This sections explains how to configure the parameters that exist in the IPSec tunnel profile configuration mode.
To define the maximum number of interfaces that the IPSec tunnel profile can instantiate, use the max-interfaces command. Once the profile reaches the maximum number of interfaces, the profile rejects any new interface instantiations and generates a warning-level log. The default value (using the no version of the command) specifies unlimited interface instantiation on a given profile.
max-interfaces
- host1(config-ipsec-tunnel-profile)#max-interfaces
500
This section describes how to define the IKE local identity and IKE peer identity values.
To set the IKE local identity (phase 1 identity) used for IKE security association negotiations, use the ike local-identity command.
![]() |
Note: The authentication algorithm for an IKE SA is associated with its identity. You must ensure that the client and server are set accordingly to successfully establish IKE security associations. |
ike local-identity
- host1(config-ipsec-tunnel-profile)#ike local-identity
domain-name domain1
To set the IKE peer identity values, use the ike peer-identity command. You can set the profile to accept logins from users that present one of the following:
The IKE identity type of userFQDN also carries a domain name. Users presenting this identity must also pass any restrictions set for the peer domain name for this profile before they are able to log in.
![]() |
Note: You can also use the wildcard (*) for the username and domain name or as the first or last character in the username or domain name string. |
ike peer-identity distinguished-name
ike peer-identity domain-name
ike peer-identity ip address
ike peer-identity username
- host1(config-ipsec-tunnel-profile)#ike peer-identity
domain-name domain2
The VPN to which a user is to be terminated is sometimes known from the IKE identities attached to the user. However, to assist in connecting users to the correct AAA domain for authentication, you can use the domain-suffix command to append a domain suffix to the username. Using the default, no domain suffix, passes usernames transparently to AAA.
domain-suffix
- host1(config-ipsec-tunnel-profile)#domain-suffix
domain2
You can use the local ip identity and peer ip identity commands to override the local and peer identities used for SA negotiations (respectively).
local ip identity
- host1(config-ipsec-tunnel-profile)#local ip
identity range 10.30.11.1 10.30.11.50
peer ip identity
- host1(config-ipsec-tunnel-profile)#peer ip
identity address 10.227.1.2
The ip profile command specifies the IP profile that is passed from the IPSec layer to the IP layer upon request for upper layer instantiation.
ip profile
- host1(config-ipsec-tunnel-profile)#ip profile
ipProfile1
The local ip address command defines the specified local IP address as the server address. The router monitors UDP port 500 for incoming login requests (that is, IKE SA negotiations) from users.
![]() |
Note: This address is typically made public to all users trying to connect to a VPN on this router. |
This command enables you to optionally set a global preshared key for the specified server address. When using global preshared keys, keep the following in mind:
local ip address
- host1(config-ipsec-tunnel-profile)#local ip
address 192.2.52.12
The local ip network command enables you to specify local, reachable networks through the IPSec tunnel. This type of “ split tunneling” enables a remote station to separate VPN traffic from Internet traffic. For example a client connecting to a corporate Intranet could use split-tunneling to send all traffic destined to 10.0.0.0/8 through the secure tunnel and reach the VPN. Other traffic (for example, Web browsing) would travel directly to the Internet through the local service provider without passing through the tunnel.
![]() |
Note: Split tunneling functions only when supported by the client software. It is up to the client to modify its routing table with the network information for split tunneling to occur |
local ip network
- host1(config-ipsec-tunnel-profile)#local ip
network 10.0.0.0 255.255.255.252
The lifetime command defines the IPSec SA lifetime parameters the tunnel profile can use for IPSec SA negotiations. These parameters include the phase 2 lifetime as a range in seconds or traffic volume.
lifetime
- host1(config-ipsec-tunnel-profile)#lifetime
seconds 5000 25000
The extended-authentication command specifies the extended user authentication protocol for use during the extended user authentication protocol exchange.
The re-authenticate keyword enables the reauthentication option (a subsequent authentication procedure). When this option is enabled, rekeying of IKE SAs uses the initial authentication protocol to reauthenticate the user. When this option is disabled, authentication is only performed at the first IKE SA establishment. Subsequent IKE SAs rekey operations inherit the initial authentication and do not reauthenticate users.
![]() |
Note: For maximum security, enable reauthentication. |
The skip-peer-config keyword disables the router from configuring peer IP characteristics.
extended-authentication
- host1(config-ipsec-tunnel-profile)#extended-authentication
chap
The transform command specifies the IPSec transforms that IPSec SA negotiations can use for this profile. The router accepts the first transform proposed by a client that matches one of the transforms specified by this command. During an IPSec SA exchange with a client, the router proposes all transforms specified by this command and one is accepted by the client.
![]() |
Note: You can specify up to six transform algorithms for this profile. |
For additional information about transforms and transform sets, see Configuring IPSec.
transform
- host1(config-ipsec-tunnel-profile)#transform
ah-hmac-md5
The pfs group command specifies the IPSec SA perfect forward secrecy (PFS) option and Diffie-Hellman prime modulus group that IPSec SA negotiations can use for this profile.
![]() |
Note: When the client initiates the IPSec negotiation, the router can accept Diffie-Hellman prime modulus groups that are higher than those configured. |
For additional information about PFS, see Configuring IPSec.
pfs group
- host1(config-ipsec-tunnel-profile)#pfs group
5
The tunnel mtu command configures the maximum transmission unit size for the tunnel.
tunnel mtu
- host1(config-ipsec-tunnel-profile)#tunnel
mtu 3000