ikev2-ipsec-wancom0-params
Parameters
The ikev2-ipsec-wancom0-params configuration element contains the following parameters:
- name
- A user-supplied name.
- state
- The state of this connection.
- Default: enabled
- Values: enabled | disabled
- remoteip
- The IPv4 or IPv6 address of the remote peer.
- remotesubnet
- The private subnet behind the remote participant. For example, 10.0.0.1/24 or 2001:DB8:0:56::/64. Defaults to a /32 for IPv4 or /128 for IPv6.
- remoteproto
- The transport protocol or protocols of the remote peer that
will be protected within the tunnel.
- Default: ALL
- Values: TCP | UDP | ICMP | SCTP | IPV6-ICMP | ALL
- remoteport
- The port that the remote peer will use to communicate within
the tunnel. For example, 1812 or 49. Use 0 to match any port.
- Default: 0
- Min: 0 | Max: 65535
- localip
- The IPv4 or IPv6 address of the local participant's public-network interface. The only accepted value is the IP address of wancom0.
- localsubnet
- The private subnet behind the local participant. The only accepted value is the wancom0 IP address with a /32 for IPv4 or /128 for IPv6.
- localproto
- The transport protocol or protocols of the local peer that will
be protected within the tunnel.
- Default: ALL
- Values: TCP | UDP | ICMP | SCTP | IPV6-ICMP | ALL
- localport
- The port that the local peer will use to communicate within the
tunnel. Use 0 to match any port.
- Default: 0
- Min: 0 | Max: 65535
- auto
- The action taken on IPsec startup. The 'start' action adds and
establishes an IPsec connection. The 'ondemand' action establishes an IPsec
connection only when an ingressing or egressing packet matches the
connection's traffic parameters. The 'ignore' action causes no automatic
IPsec startup operation.
- Default: ondemand
- Values: start | ondemand | ignore
- ike-algorithms
- The IKE algorithm used for IKE security association connections
(phase 1). The format is
<cipher>-<hash>;<dhgroup>
. For example:aes256-sha256;dh14
. Using the correct separator is required.- Allowed ciphers: aes128, aes192, aes256, aes_ctr128, aes_ctr192, aes_ctr256, aes_gcm128, aes_gcm192, aes_gcm256
- Allowed hash: sha256, sha512
- Allowed DH: dh14, dh15, dh16, dh17, dh18
- Default: aes256-sha256;dh14
- ipsec-protocol
- The type of IPsec security association.
- Default: esp
- Values: ah | esp
- ipsec-algorithms
- The IPsec algorithms offered and accepted during phase 2
negotiation. The format is
<cipher>-<hash>[;<DH-group>]
. For example:aes256-sha256;modp2048
. Using the correct separator is required.- Default: aes256-sha256;modp2048
- Allowed ciphers: aes128, aes192, aes256, aes_ctr128, aes_ctr192, aes_ctr256, null
- Allowed hash: sha1, sha256, sha512, aes_xcbc
- Allowed DH: modp2048
- pfs
- Whether perfect forward secrecy is used.
- Default: yes
- Values: yes | no
- authby
- How the two endpoints authenticate each other. Use 'secret' for
a pre-shared key; use 'never' if negotiation is never to be attempted or
accepted; and use 'rsasig' for RSA authentication with SHA-1.
- Default: rsasig
- Values: secret | never | rsasig
- ipsec-mode
- The mode of the IPsec connection.
- Default: tunnel
- Values:
- tunnel—A host-to-host, host-to-subnet, or subnet-to-subnet tunnel
- transport—A host-to-host tunnel.
- passthrough—no IPsec processing
- drop—Discard the packets.
- reject—The packets are discarded and a diagnostic ICMP returned.
- esn
- Whether to enable extended sequence numbers for the IPsec SA.
If 'either' is specified, the responder decides. If the SBC is the responder and 'either' is
selected, the SBC picks 'no'.
- Default: no
- Values: yes | no | either
- rekey
- Whether a connection should be renegotiated when it is about to
expire.
- Default: yes
- Values: no | yes
- ipsec-sa-life-secs
- The number of seconds an IPsec SA connection lasts.
- Default: 28800
- Min: 1 | Max: 86400
- ike-sa-life-secs
- The number of seconds an IKEv2 SA connection lasts.
- Default: 3600
- Min: 1 | Max: 86400
- rekeymargin
- The number of seconds before an SA expires during which to
negotiate a new connection.
- Default: 10
- Min: 1 | Max: 86400
- rekeyfuzz
- The maximum percentage by which the rekeymargin should be
randomly increased to randomize rekeying intervals.
- Default: 0
- Min: 0 | Max: 8640000
- shared-password
- The password for IKE PSK authentication.
- local-certificate-profile-identity
- Specify the identity of the ike-certificate-profile to use for the local peer. This string should match the Subject Alernative Name of the local end-entity-certificate attribute in the ike-certificate-profile element.
- remote-certificate-identity
- Specify the identity of the ike-certificate-profile to use for the remote peer. This string should match the Subject Alternative Name of the peer's certificate.
- dpddelay
- The number of seconds between DPD keepalive messages.
- Default: 0 (disabled)
- Min: 0 | Max: 999999999
- dpdtimeout
- The number of seconds to idle without hearing back from the
peer.
- Default: 0
- Min: 0 | Max: 999999999
- dpdaction
- The action to be taken once a peer is declared dead.
- Default: hold
- Values: hold | clear | restart
Path
The ikev2-ipsec-wancom0-params configuration element is in the security element.
ORACLE# configure terminal
ORACLE(configure)# security
ORACLE(security)# ikev2-ipsec-wancom0-params
ORACLE(ikev2-ipsec-wancom0-params)#