The configured IPSec SA lifetime is only valid for the new IPSec SAs established in IKE negotiation mode.
For a dynamic SA, configure the SA hard lifetime so that the SA can be updated in real time, reducing the crash risk and improving security.
Hard lifetime: specifies the lifetime of an IPSec SA.
When two devices negotiate an IPSec SA, the actual hard lifetime is the smaller of the two values configured on the two devices.
Soft lifetime: specifies the time after which a new IPSec SA is negotiated so that the new IPSec SA will be ready before the hard lifetime of the original IPSec SA expires.
Soft Lifetime Type |
Description |
---|---|
Time-based soft lifetime (soft timeout period) |
The value is 70% of the actual hard lifetime (hard timeout period). |
Traffic-based soft lifetime (soft timeout traffic) |
|
Before an IPSec SA becomes invalid, IKE negotiates a new IPSec SA for the remote end. The remote end uses the new IPSec SA to protect IPSec communication immediately after the new IPSec SA is negotiated. If service traffic is transmitted, the original IPSec SA is deleted immediately. If no service traffic is transmitted, the original IPSec SA will be deleted after 10s or the hard lifetime expires.
If the time-based lifetime and traffic-based lifetime are both set for an IPSec SA, the IPSec SA becomes invalid when either lifetime expires.
Run system-view
The system view is displayed.
Run ipsec sa global-duration { time-based interval | traffic-based size }
The global IPSec SA hard lifetime is set.
By default, the global time-based SA hard lifetime is 3600 seconds and the global traffic-based SA hard lifetime is 1843200 Kbytes.