- Without defaults, below configuration list is needed:
- IKEv2
- Proposal
- Policy
- Keyring
- Profile
- IPSEC
- Transform set
- Profile
- IKEv2
- IKEv2 Proposal
- Used for normal IPSEC negotiation
- DH group
- Encryption – AES
- Integrity – SHA
- Used for normal IPSEC negotiation
- Tunnel Interface
- Attaching VPN config

- IKEv2 policy
- Container for proposal that was just created

- IKEv2 Keyring
- Contains authentication and specifies the remote host.
- PSK or RSA/Certificate
- Contains authentication and specifies the remote host.

- IKEv2 Profile
- Contains identity and authentication we want to use.
- DOES NOT CONTAIN ACTUAL PSK
- SORT OF REPETITIVE BUT KEYRING GETS ADDED TO THIS PROFILE
- Contains identity and authentication we want to use.

- IPSEC Transform-Set
- Specifies encryption and hashing algorithms.
- Under TS the tunnel mode can be set as well.
- ie. Tunnel or Transport. Default is Tunnel.
- Under TS the tunnel mode can be set as well.
- Specifies encryption and hashing algorithms.
- IPSEC Profile
- Glues together the IKEv2 profile and Transform set
- Tunnel Interface
- Specifies normal GRE operation and attaches IPSEC profile to the tunnel.

- Disable Smart Defaults (optional)
- If needed, can disable the smart defaults
‘no crypto ikev2 policy default’
‘no crypto ipsec profile default’
‘no crypto ipsec transform-set default’
‘no crypto ikev2 proposal default’
- Verify Tunnel/Protection

Note the default IKEv2 policy is disabled.

Shows specifics of VPN IKEv2 settings.

Shows a security association exists for IKEv2.

Note default profile is disabled.

Shows there is a security association and we have packet encaps/decaps.