PDN Gateway Configuration
Configuring Optional Features on the P-GW ▀
Cisco ASR 5x00 Packet Data Network Gateway Administration Guide ▄
187
The
group 2
command specifies the Diffie-Hellman algorithm as Group 2, indicating medium security. The
Diffie-Hellman algorithm controls the strength of the crypto exponentials. This is the default setting for IKEv2
transform sets configured on the system.
The
hmac
command configures the Encapsulating Security Payload (ESP) integrity algorithm. The
sha1-96
keyword uses a 160-bit secret key to produce a 160-bit authenticator value. This is the default setting for
IKEv2 transform sets configured on the system.
The
lifetime
command configures the time the security key is allowed to exist, in seconds.
The
prf
command configures the IKE Pseudo-random Function, which produces a string of bits that cannot be
distinguished from a random bit string without knowledge of the secret key. The
sha1
keyword uses a 160-bit
secret key to produce a 160-bit authenticator value. This is the default setting for IKEv2 transform sets
configured on the system.
Creating and Configuring a Crypto Template
The following example configures an IKEv2 crypto template:
configure
context <
pgw_context_name
> -noconfirm
crypto template <
crypto_template_name
> ikev2-dynamic
ikev2-ikesa transform-set list <
name1
> . . . <
name6
>
ikev2-ikesa rekey
payload <
name
> match childsa match ipv4
ipsec transform-set list <
name1
> . . . <
name4
>
rekey
end
Notes:
The
ikev2-ikesa transform-set list
command specifies up to six IKEv2 transform sets.
The
ipsec transform-set list
command specifies up to four IPSec transform sets.
Binding the S5 IP Address to the Crypto Template
The following example configures the binding of the S5 interface to the crypto template:
configure
context <
pgw_ingress_context_name
> -noconfirm
gtpu-service <
gtpu_ingress_service_name
>