| Where Can I Use
                                This? | What Do I Need? | 
|---|
    
  
 
  
            
            In IKEv2, two IKE Crypto profile values, Key Lifetime and
                    IKEv2 Authentication Multiple, control the establishment
                of IKEv2 IKE SAs. The key lifetime is the length of time that a negotiated IKE SA
                key is effective. Before the key lifetime expires, the SA must be re-keyed;
                otherwise, upon expiration, the SA must begin a new IKEv2 IKE SA re-key. The default
                value is 8 hours. 
            The reauthentication interval is derived by multiplying the Key
                    Lifetime by the IKEv2 Authentication
                Multiple. The authentication multiple defaults to 0, which disables the
                reauthentication feature. 
            The range of the authentication multiple is 0-50. So, if you were to configure an
                authentication multiple of 20, for example, the system would perform
                reauthentication every 20 re-keys, which is every 160 hours. That means the gateway
                could perform Child SA creation for 160 hours before the gateway must reauthenticate
                with IKE to recreate the IKE SA from scratch.
            In IKEv2, the Initiator and Responder gateways have their own key lifetime value, and
                the gateway with the shorter key lifetime is the one that will request that the SA
                be re-keyed.
            
            This task is optional; the default setting of the IKEv2 IKE SA re-key lifetime is 8
                hours. The default setting of the IKEv2 Authentication Multiple is 0, meaning the
                reauthentication feature is disabled.
                
            To change the default values, perform the following task. A prerequisite is that an
                IKE Crypto profile already exists.