ikev2-ipsec-wancom0-params
Parameters
The ikev2-ipsec-wancom0-params configuration element contains the following parameters:
- name
 - A user-supplied name.
 - state
 - The state of this connection.
                        
- Default: enabled
 - Values: enabled | disabled
 
 - remoteip
 - The IPv4 or IPv6 address of the remote peer.
 - remotesubnet
 - The private subnet behind the remote participant. For example, 10.0.0.1/24 or 2001:DB8:0:56::/64. Defaults to a /32 for IPv4 or /128 for IPv6.
 - remoteproto
 - The transport protocol or protocols of the remote peer that
                        will be protected within the tunnel.
                        
- Default: ALL
 - Values: TCP | UDP | ICMP | SCTP | IPV6-ICMP | ALL
 
 - remoteport
 - The port that the remote peer will use to communicate within
                        the tunnel. For example, 1812 or 49. Use 0 to match any port.
                        
- Default: 0
 - Min: 0 | Max: 65535
 
 - localip
 - The IPv4 or IPv6 address of the local participant's public-network interface. The only accepted value is the IP address of wancom0.
 - localsubnet
 - The private subnet behind the local participant. The only accepted value is the wancom0 IP address with a /32 for IPv4 or /128 for IPv6.
 - localproto
 - The transport protocol or protocols of the local peer that will
                        be protected within the tunnel.
                        
- Default: ALL
 - Values: TCP | UDP | ICMP | SCTP | IPV6-ICMP | ALL
 
 - localport
 - The port that the local peer will use to communicate within the
                        tunnel. Use 0 to match any port.
                        
- Default: 0
 - Min: 0 | Max: 65535
 
 - auto
 - The action taken on IPsec startup. The 'start' action adds and
                        establishes an IPsec connection. The 'ondemand' action establishes an IPsec
                        connection only when an ingressing or egressing packet matches the
                        connection's traffic parameters. The 'ignore' action causes no automatic
                        IPsec startup operation.
                        
- Default: ondemand
 - Values: start | ondemand | ignore
 
 - ike-algorithms
 - The IKE algorithm used for IKE security association connections
                        (phase 1). The format is
                            
<cipher>-<hash>;<dhgroup>. For example:aes256-sha256;dh14. Using the correct separator is required.- Allowed ciphers: aes128, aes192, aes256, aes_ctr128, aes_ctr192, aes_ctr256, aes_gcm128, aes_gcm192, aes_gcm256
 - Allowed hash: sha256, sha512
 - Allowed DH: dh14, dh15, dh16, dh17, dh18
 - Default: aes256-sha256;dh14
 
 - ipsec-protocol
 - The type of IPsec security association.
                        
- Default: esp
 - Values: ah | esp
 
 - ipsec-algorithms
 - The IPsec algorithms offered and accepted during phase 2
                        negotiation. The format is
                            
<cipher>-<hash>[;<DH-group>]. For example:aes256-sha256;modp2048. Using the correct separator is required.- Default: aes256-sha256;modp2048
 - Allowed ciphers: aes128, aes192, aes256, aes_ctr128, aes_ctr192, aes_ctr256, null
 - Allowed hash: sha1, sha256, sha512, aes_xcbc
 - Allowed DH: modp2048
 
 - pfs
 - Whether perfect forward secrecy is used.
                        
- Default: yes
 - Values: yes | no
 
 - authby
 - How the two endpoints authenticate each other. Use 'secret' for
                        a pre-shared key; use 'never' if negotiation is never to be attempted or
                        accepted; and use 'rsasig' for RSA authentication with SHA-1.
                        
- Default: rsasig
 - Values: secret | never | rsasig
 
 - ipsec-mode
 - The mode of the IPsec connection.
                        
- Default: tunnel
 - Values: 
                              
- tunnel—A host-to-host, host-to-subnet, or subnet-to-subnet tunnel
 - transport—A host-to-host tunnel.
 - passthrough—no IPsec processing
 - drop—Discard the packets.
 - reject—The packets are discarded and a diagnostic ICMP returned.
 
 
 - esn
 - Whether to enable extended sequence numbers for the IPsec SA.
                        If 'either' is specified, the responder decides. If the SBC is the responder and 'either' is
                        selected, the SBC picks 'no'.
                        
- Default: no
 - Values: yes | no | either
 
 - rekey
 - Whether a connection should be renegotiated when it is about to
                            expire.
                        
- Default: yes
 - Values: no | yes
 
 - ipsec-sa-life-secs
 - The number of seconds an IPsec SA connection lasts. 
                        
- Default: 28800
 - Min: 1 | Max: 86400
 
 - ike-sa-life-secs
 - The number of seconds an IKEv2 SA connection lasts.
                        
- Default: 3600
 - Min: 1 | Max: 86400
 
 - rekeymargin
 - The number of seconds before an SA expires during which to
                        negotiate a new connection.
                        
- Default: 10
 - Min: 1 | Max: 86400
 
 - rekeyfuzz
 - The maximum percentage by which the rekeymargin should be
                        randomly increased to randomize rekeying intervals.
                        
- Default: 0
 - Min: 0 | Max: 8640000
 
 - shared-password
 - The password for IKE PSK authentication.
 - local-certificate-profile-identity
 - Specify the identity of the ike-certificate-profile to use for the local peer. This string should match the Subject Alernative Name of the local end-entity-certificate attribute in the ike-certificate-profile element.
 - remote-certificate-identity
 - Specify the identity of the ike-certificate-profile to use for the remote peer. This string should match the Subject Alternative Name of the peer's certificate.
 - dpddelay
 - The number of seconds between DPD keepalive messages.
                        
- Default: 0 (disabled)
 - Min: 0 | Max: 999999999
 
 - dpdtimeout
 - The number of seconds to idle without hearing back from the
                            peer.
                        
- Default: 0
 - Min: 0 | Max: 999999999
 
 - dpdaction
 - The action to be taken once a peer is declared dead.
                        
- Default: hold
 - Values: hold | clear | restart
 
 
Path
The ikev2-ipsec-wancom0-params configuration element is in the security element.
ORACLE# configure terminal
ORACLE(configure)# security
ORACLE(security)# ikev2-ipsec-wancom0-params
ORACLE(ikev2-ipsec-wancom0-params)#