04-27-2006 06:59 AM - edited 02-21-2020 02:23 PM
With a site-to-site VPN connection between two Cisco 837s, is there a way that I can configure the IPSEC tunnel to be torn down after a period of inactivity and then the tunnel is built again when further traffic is passed?
Solved! Go to Solution.
05-03-2006 04:37 AM
Hi mitchen
One way (but probably not what you are searching for), to "timeout" the IPSEC Session, is to use the IPSEC SA-lifetime.
If connectivity is still needed (crypto acl are triggered) the connection will be re-established, else it will be torn down.
SA-lifetime is no idle-timeout but used to "re-authenticate/re-establish /provide more security" for the IPSEC tunnel on a regular basis.
With a "Newer" IOS there is a feature called:
crypto ipsec security-association idle-time seconds
this can be created globally or specified per peer.
You will find all details here:
"Don't forget to rate useful posts"
Greetings
Jarle
Greetings
Jarle
05-03-2006 04:37 AM
Hi mitchen
One way (but probably not what you are searching for), to "timeout" the IPSEC Session, is to use the IPSEC SA-lifetime.
If connectivity is still needed (crypto acl are triggered) the connection will be re-established, else it will be torn down.
SA-lifetime is no idle-timeout but used to "re-authenticate/re-establish /provide more security" for the IPSEC tunnel on a regular basis.
With a "Newer" IOS there is a feature called:
crypto ipsec security-association idle-time seconds
this can be created globally or specified per peer.
You will find all details here:
"Don't forget to rate useful posts"
Greetings
Jarle
Greetings
Jarle
05-11-2006 08:44 AM
Hi Jarle,
yes, I found the "crypto ipsec security-association idle-time seconds" command did what I was looking for.
Thanks.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide