advertise {adv-delay seconds | adv-lifetime time | adv-interval { seconds | msec num } | num-adv-sent number | prefix-length-extn | reg-lifetime reg_time}advertise adv-delay secondsseconds is the advertisement delay in milliseconds and must be an integer from 10 through 5000.adv-lifetime timemsec num: Configures agent advertisement Interval in milliseconds. can be any integer from 100 through 1800000.num-adv-sent numberreg-lifetime reg_timemax-subscribers max#count can be configured to any integer value between 0 and 500000.Important: The maximum number of subscribers supported is dependant on the license key installed and the number of active PACs/PSCs installed in the system. A fully loaded system with 13 active PACs/PSCs can support 500,000 total subscribers. Refer to the license key command for additional information.
When configuring the max-subscribers option, be sure to consider the following:Use the no bind address command to delete a previously configured binding.challenge-window numberThe number of recently sent challenge values that are considered valid. number must be an integer from 1 through 5.checksum : Disables the introduction of the checksum field in outgoing GRE packets.checksum-verify: Disables verification of the GRE checksum (if present) in incoming GRE packets.reorder-timeout: sets the maximum number of milliseconds to wait before processing reordered out-of-sequence GRE packets to the default setting: 100.sequence-mode: Disables the reordering of incoming out-of-sequence GRE packets by setting this parameter to the default setting: none.sequence-numbers: Disables the insertion or removal of GRE sequence numbers in GRE packets.enable: Disables MIP Registration Revocation on the FA.max-retransmission: Sets the maximum number of retransmissions to 3.retransmission-timeout: Sets the retransmission timeout to 3 seconds.| trigger internal-failure: Disables the FA from sending revocation messages when a session experiences an internal failure.default subscriber profile_nameno default subscriber profile_nameSpecifies the name of the configured subscriber profile. profile_name can be between 1 and 63 alpha and/or number characters and is case sensitive.default subscriber user1fa-ha-spi remote-address { ha_ip_address | ip_addr_mask_combo } spi-number number { encrypted secret enc_secret | secret secret } [ description string | hash-algorithm { hmac-md5 | md5 | rfc2002-md5 } | monitor-ha | replay-protection { timestamp | nonce } | timestamp-tolerance tolerance ]ha_ip_address :Specifies the IP address of the HA in IP v4 dotted decimal notation.ip_addr_mask_combo: Specifies the IP address of the HA and specifies the IP address network mask bits. ip_addr_mask_combo must be specified using the form ‘IP Address/Mask Bits’ where the IP address is specified using the standard IPv4 dotted decimal notation and the mask bits are a numeric value which is the number of bits in the subnet mask.spi-number number
• encrypted secret enc_secret : Specifies the encrypted shared key (enc_secret) between the FA service and the HA. enc_secret must be between 1 and 254 alpha and/or numeric characters and is case sensitive.Important: The encrypted keyword is intended only for use by the system while saving configuration scripts. The system displays the encrypted keyword in the configuration file as a flag that the variable following the secret keyword is the encrypted version of the plain text secret key. Only the encrypted secret key is saved as part of the configuration file.
• secret secret : Specifies the shared key (secret) between the FA service and the HA. secret must be between 1 and 127 alpha and/or numeric characters and is case sensitive.description stringThis is a description for the SPI. string must be an alpha and or numeric string of from 1 through 31 characters.
• hmac-md5 : Configures the hash-algorithm to implement HMAC-MD5 per RFC 2002bis.
• md5 : Configures the hash-algorithm to implement MD5 per RFC 1321.
• rfc2002-md5 : Configures the hash-algorithm to implement keyed-MD5 per RFC 2002.To set the behavior of the HA monitor feature, refer to the ha-monitor command in this chapter. To disable this command (if enabled) for this HA address, re-enter the entire fa-ha-spi command without the monitor-ha keyword.
• nonce: Configures replay protection to be implemented using NONCE per RFC 2002.
• timestamp: Configures replay protection to be implemented using timestamps per RFC 2002.timestamp-tolerance tolerancetolerance is measured in seconds and can be configured to any integer value between 0 and 65535.Important: The SPI configuration on the HA must match the SPI configuration for the FA service on the system in order for the two devices to communicate properly.
Use the no version of this command to delete a previously configured SPI.gre { checksum | checksum-verify | reorder-timeout timeout | sequence-mode { none | reorder } | sequence-numbers }reorder-timeout timeoutConfigures maximum number of milliseconds to wait before processing reordered out-of-sequence GRE packets. timeout must be an integer from 0 through 5000.none: Disables reordering of incoming out-of-sequence GRE packets.reorder: Enables reordering of incoming out-of-sequence GRE packets.interval secsec must be a numeric value between 1 and 36000.sec must be a numeric value between 30 and 600.num-retry numnum must be a numeric value between 0 and 10.Use this command to set parameters for the HA monitor feature. This feature allows the AGW/FA to monitor HAs with which it has MIP sessions. The monitoring feature is triggered when the AGW/FA does not receive any MIP traffic from a HA for a configured amount of time (max-inactivity-time). The AGW/FA starts sending special MIP RRQ monitor messages and waits for RRP monitor message responses from the HA. The RRQ monitor messages are addressed to the HA service address. The source address of the monitor-request messages is the FA service's IP address.
• If no monitor response is received during the interval time (interval), the AGW retransmits the monitor message a configured number of times (num-retry).
• If no response is received after retransmitting for the number configured in num-retry, the HA is considered down. The AGW/FA sends a trap (HAUnreachable) to the management station. Monitoring of this HA is stopped until a MIP control message is received from the particular HA and when the AGW/FA sends a trap (HAreachable) to the management station and starts monitoring the HA again.Important: This command only sets the behavior of the HA monitor feature. To enable the HA monitor feature for each HA address, refer to the fa-ha-spi command in this chapter. Up to 256 HAs can be monitored per system.
ip local-port port#ip local-port 3950isakmp {peer-ha ha_address {crypto map map_name [ [ encrypted ] secret secret ]} | default { crypto map map_name [ [ encrypted ] secretsecret]}}
• ha_address : The IP address of the HA with which the FA service will establish an IPSec SA. The address must be expressed in dotted decimal format.
• crypto map map_name : The name of a crypto map configured in the same context that defines the IPSec tunnel properties. map_name is the name of the crypto map and can be from 1 to 127 alpha and/or numeric characters.
• encrypted : This keyword is intended only for use by the system while saving configuration scripts. The system displays the encrypted keyword in the configuration file as a flag that the variable following the secret keyword is the encrypted version of the plain text secret key. Only the encrypted secret key is saved as part of the configuration file.
• secret secret : The pre-shared secret that will be used during the IKE negotiation. preshared_secret is the secret and can be from 1 to 127 alpha and/or numeric characters.
• crypto map map_name : The name of a crypto map configured in the same context that defines the IPSec tunnel properties. map_name is the name of the crypto map and can be from 1 to 127 alpha and/or numeric characters.
• encrypted : This keyword is intended only for use by the system while saving configuration scripts. The system displays the encrypted keyword in the configuration file as a flag that the variable following the secret keyword is the encrypted version of the plain text secret key. Only the encrypted secret key is saved as part of the configuration file.
• secret secret : The pre-shared secret that will be used during the IKE negotiation. preshared_secret is the secret and can be from 1 to 127 alpha and/or numeric characters.Important: For maximum security, it is recommended that the above command be executed for every possible HA that the FA service communicates with.
Important: For maximum security, the default crypto map should be configured in addition to peer-ha crypto maps instead of being used to provide IPSec SAs to all HAs.
no isakmp peer-ha 1.2.3.4max-challenge-len lengthEnable this feature if there is no need to authenticate the subscriber at HA using MN-AAA extension.multiple-reg numberImportant: The system will only support multiple Mobile IP sessions per subscriber if the subscriber’s mobile node has a static IP address. The system will only allow a single Mobile IP session for mobile nodes that receive a dynamically assigned IP address. In addition, because only a single Mobile IP or proxy-Mobile IP session is supported for IP PDP contexts, this parameter must remain at its default configuration.
Important: Cisco Systems strongly recommends that you do not use this command without first consulting Cisco Systems Technical Support. This command applies to very specific scenarios where packet reassembly is not supported at the far end of the tunnel. There are cases where the destination network may either discard the data, or be unable to reassemble the packets.
Important: This functionality works best when the FA service is communicating with an HA service running in a system. However, an FA service running in the system communicating with an HA from a different manufacturer will operate correctly even if this parameter is enabled.
proxy-mip { allow | ha-failover [ max-attempts max_attempts | num-attempts-before-switching num_attempts | timeout seconds ]| max-retransmissions number | renew-percent-time renew-time | retransmission-timeout time }ha-failover [max-attempts max_attempts | num-attempts-before-switching num_attempts | timeout seconds ]
• max-attempts max_attempts - Configures the maximum number of retransmissions of Proxy MIP control messages. max_attempts must be an integer from 1 through 10. Default is 4
• num-attempts-before-switching num_attempts - Configures the total number of RRQ attempts (including retransmissions) before failing over to the alternate HA. num_attempts must be an integer from 1 through 5. Default is 2.
• timeout seconds - Configures the retransmission timeout, in seconds, of Proxy MIP control messages when failover happens. seconds must be an integer from 1 through 50. Default is 2max-retransmissions numbernumber is the maximum number of retries and can be configured to any integer value from 1 to 4294967295.renew-percent-time renew-timerenew-time is entered as a percentage of the advertisement registration lifetime configured for the FA service. (Refer to the advertise command in this chapter). The time can be configured to any integer value from 1 to 100.The following equation can be used to calculate renew-time:renew-time = ( duration / lifetime ) * 100time is measured in seconds and can be configured to any integer value from 1 to 100.The proxy-mip command and its keywords configure the FA services support for Proxy Mobile Mobile IP.reg-timeout timereg-timeout 10Use the no option of this command to disable reverse tunneling. If reverse tunneling is disabled, and the mobile node does not request it, then triangular routing is used.Important: If reverse tunneling is disabled on the system and a mobile node requests it, the call will be rejected with a reply code of 74H (reverse-tunneling unavailable).
revocation { enable | max-retransmission number | negotiate-i-bit | retransmission-timeout secs | trigger internal-failure }max-retransmission numberThe maximum number of retransmissions of a Revocation message before the revocation fails. number must be an integer from 0 through 10.The number of seconds to wait for a Revocation Acknowledgement from the HA before retransmitting the Revocation message. secs must be an integer from 1 through 10.clear low_threshImportant: This value is ignored for the Alert model. In addition, if this value is not configured for the Alarm model, the system assumes it is identical to the high threshold.
• Enter condition: Actual number of registration reply errors > High Threshold
• Clear condition: Actual number of registration reply errors £ Low Threshold
![]() |
Cisco Systems Inc. |
Tel: 408-526-4000 |
Fax: 408-527-0883 |