Sunteți pe pagina 1din 26

12/9/2015

AnIntroductiontoIPSecurity(IPSec)EncryptionCisco

AnIntroductiontoIPSecurity(IPSec)Encryption
Updated: May19,2008

Contents
Introduction
Prerequisites
Requirements
ComponentsUsed
Conventions

Background
CryptoLingo(Vocabulary)
ConfigureISAKMP
1.PreSharedKeys
2.UseaCA

ConfigureIPsec
CreateExtendedACL
CreateIPsecTransform(s)
CreateCryptoMap
ApplyCryptoMaptoInterface

MemoryandCPUConsiderations
OutputfromshowCommands
IKERelatedOutput
IPsecRelatedshowCommands

SampleConfigurations
NetworkDiagram
Configurations

DebugInformation
ImplementationTipsforIPsec
HelpandRelevantLinks
IPsecInformation
MoreSampleConfigurationsforIPsec

References
RelatedInformation

Introduction
ThisdocumentintroducesIPsectousersinarapid,butconciseformat.Thisdocumentcontainsbasic
configurationsofInternetKeyExchange(IKE)withpresharedkeys,IKEwithaCertificationAuthority,andIPsec.
http://www.cisco.com/c/en/us/support/docs/securityvpn/ipsecnegotiationikeprotocols/16439IPSECpart8.html

1/26

12/9/2015

AnIntroductiontoIPSecurity(IPSec)EncryptionCisco

Thisisnotanexhaustivedocument.But,thisdocumentdoeshelpyoutounderstandthetasksandtheorderin
whichtheyareaccomplished.

Warning:Therearesevererestrictionsontheexportofstrongcryptography.IfyouviolateU.S.Federal
Law,thenyou,notCisco,areheldaccountable.Ifyouhaveanyquestionsrelatedtoexportcontrol,sendandE
mailtoexport@cisco.com.
Note:MulticastandBroadcastarenotsupportedonnormalLANtoLANtunnelsoronVPNclientsthatterminate
onanydevices.MulticastcanbepassedonlyonGREtunnels.ThisissupportedonlyonroutersandnotonVPN
3000Concentratorsorfirewalls(ASA/PIX).

Prerequisites
Requirements
Therearenospecificrequirementsforthisdocument.

ComponentsUsed
Thisdocumentisnotrestrictedtospecificsoftwareandhardwareversions.

Conventions
RefertoCiscoTechnicalTipsConventionsformoreinformationondocumentconventions.

Background
IPsecisthenextgenerationnetworklayercryptoplatformfortheCiscosecurityplatforms(CiscoIOSSoftware,
PIX,andsoforth).OriginallydescribedinRFCs1825through1829,whicharenowobsolete,IPseciscurrently
discussedinanumberofdocumentspresentedbytheIETFIPSecurityWorkingGroup .IPseccurrently
supportsIPversion4unicastpackets.IPv6andmulticastsupportistoarriveatalatertime.
IPsechasthesestrengthsovercurrentCiscocryptoofferings:
MultivendorSincetheIPsecframeworkisstandardized,customersarenotlockedintoanyspecificvendor
product.IPsecisfoundonrouters,firewalls,andclientdesktops(Windows,Mac,andsoforth).
ScalabilityIPsecisdesignedwithlargeenterprisesinmind.Therefore,ithasbuiltinkeymanagement.
Note:WhileseveralCiscoplatformscanuseIPsec,thisdocumentisgearedtowardsCiscoIOSsoftware.

CryptoLingo(Vocabulary)
YouneedtoknowthesetermsinordertounderstandIPsec,andtoreadtherestofthisdocument.Whenyousee
acronymsinotherportionsofthisdocument,refertothispagefordefinitions.
AdvancedEncryptionStandard(AES)AESwasfinalizedasaFederalInformationProcessingStandard
(FIPS)approvedcryptographicalgorithmtobeusedinordertoprotectelectronicdatatransmission(FIPSPUB
197).AESisbasedontheRijndaelalgorithm,whichspecifieshowtousekeyswithalengthof128,192,or256
bitstoencryptblockswithalengthof128,192,or256bits.Allninecombinationsofkeylengthandblocklength
arepossible.
AuthenticationHeader(AH)Thisisasecurityprotocolthatprovidesauthenticationandoptionalreplay
detectionservices.AHisembeddedinthedatatobeprotected,forexample,afullIPdatagram.AHcanbeused
eitherbyitselforwithEncryptionServicePayload(ESP).RefertotheRFC2402 .
AuthenticationThisisoneofthefunctionsoftheIPsecframework.Authenticationestablishestheintegrityof
datastreamandensuresthatitisnottamperedwithintransit.Italsoprovidesconfirmationaboutdatastream
origin.
http://www.cisco.com/c/en/us/support/docs/securityvpn/ipsecnegotiationikeprotocols/16439IPSECpart8.html

2/26

12/9/2015

AnIntroductiontoIPSecurity(IPSec)EncryptionCisco

CertificationAuthority(CA)Thisisathirdpartyentitywiththeresponsibilitytoissueandrevokecertificates.
EachdevicethathasitsowncertificateandpublickeyoftheCAcanauthenticateeveryotherdevicewithina
givenCAdomain.Thistermalsoappliestoserversoftwarethatprovidestheseservices.
CertificateAcryptographicallysignedobjectthatcontainsanidentityandapublickeyassociatedwiththis
identity.
ClassiccryptoThisisCiscoproprietaryencryptionmechanismusedinCiscoIOSSoftwareRelease11.2.
ClassiccryptoisavailableinCiscoIOSSoftwareRelease11.3.But,IPsecisnotretrofittedtoCiscoIOS
SoftwareRelease11.2.YoucanalsoseethenameclassiccryptoreferredtoasEncryptionExpressorCisco
EncryptionTechnology(CET)inthemarketingliterature.
CertificateRevocationList(CRL)Thisisadigitallysignedmessagethatlistsallofthecurrentbutrevoked
certificateslistedbyagivenCA.Thisisanalogoustoabookofstolenchargecardnumbersthatallowstoresto
rejectbadcreditcards.
CryptomapThisisaCiscoIOSsoftwareconfigurationentitythatperformstwoprimaryfunctions.First,it
selectsdataflowsthatneedsecurityprocessing.Second,itdefinesthepolicyfortheseflowsandthecryptopeer
thattrafficneedstogoto.
Acryptomapisappliedtoaninterface.Theconceptofacryptomapwasintroducedinclassiccryptobutwas
expandedforIPsec.
DataintegrityThisisdataintegritymechanisms,throughtheuseofsecretkeybasedorpublickeybased
algorithms,thatallowtherecipientofapieceofprotecteddatainordertoverifythatthedatahasnotbeen
modifiedintransit.
DataconfidentialityThisisthemethodwhereprotecteddataismanipulatedsothatnoattackercanreadit.
Thisiscommonlyprovidedbydataencryptionandkeysthatareonlyavailabletothepartiesinvolvedinthe
communication.
DataoriginauthenticationThisisasecurityservicewherethereceivercanverifythatprotecteddatamight
haveoriginatedonlyfromthesender.Thisservicerequiresadataintegrityserviceplusakeydistribution
mechanism,whereasecretkeyissharedonlybetweenthesenderandreceiver.
DataEncryptionStandard(DES)TheDESwaspublishedin1977bytheNationalBureauofStandardsandisa
secretkeyencryptionschemebasedontheLuciferalgorithmfromIBM.ThecontrastofDESispublickey.Cisco
usesDESinclassiccrypto(40bitand56bitkeylengths),IPseccrypto(56bitkey),andonthePIXFirewall(56
bitkey).
DiffieHellmanThisisamethodoftheestablishmentofasharedkeyoveraninsecuremedium.DiffieHellman
isacomponentofOakley,whichisdefinedinthisdefinitionlist.
DSSAdigitalsignaturealgorithmdesignedbyTheUSNationalInstituteofStandardsandTechnology(NIST)
basedonpublickeycryptography.DSSdoesnotdouserdatagramencryption.DSSisacomponentinclassic
crypto,aswellastheRedcreekIPseccard,butnotinIPsecimplementedinCiscoIOSsoftware.
EncryptionServiceAdapter(ESA)Thisisahardwarebasedencryptionacceleratorthatisusedin:
Cisco7204and7206routers
SecondgenerationVersatileInterfaceProcessor240s(VIP240s)inallCisco7500seriesrouters
VIP240intheCisco7000seriesroutersthathavetheCisco7000seriesRouteSwitchProcessor(RSP7000)
andCisco7000seriesChassisInterface(RSP7000CI)cardsinstalled.
IPsecdoesnotusetheESAacceleration,butitdoesworkinaboxthathasanESAcardonasoftwareonly
basis.
EncapsulatingSecurityPayload(ESP)Asecurityprotocolthatprovidesdataconfidentialityandprotection
withoptionalauthenticationandreplaydetectionservices.ESPcompletelyencapsulatesuserdata.ESPcanbe
usedeitherbyitselforinconjunctionwithAH.RefertoRFC2406:IPEncapsulatingSecurityPayload(ESP) .
HashThisisaonewayfunctionthattakesaninputmessageofarbitrarylengthandproducesafixedlength
digest.CiscousesbothSecureHashAlgorithm(SHA)andMessageDigest5(MD5)hasheswithinour
implementationoftheIPsecframework.SeethedefinitionforHMACformoreinformation.
HMACThisisamechanismformessageauthenticationthatusescryptographichashessuchasSHAandMD5.
http://www.cisco.com/c/en/us/support/docs/securityvpn/ipsecnegotiationikeprotocols/16439IPSECpart8.html

3/26

12/9/2015

RefertoRFC2104

AnIntroductiontoIPSecurity(IPSec)EncryptionCisco

foranexhaustivediscussionofHMAC.

InternetKeyExchange(IKE)AhybridprotocolthatusespartOakleyandpartofanotherprotocolsuitecalled
SKEMEinsidetheInternetSecurityAssociationandKeyManagementProtocol(ISAKMP)framework.IKEis
usedtoestablishasharedsecuritypolicyandauthenticatedkeysforservices,suchasIPsec,thatrequirekeys.
BeforeanyIPsectrafficcanbepassed,eachrouter/firewall/hostmustbeabletoverifytheidentityofitspeer.
Manuallyenterpresharedkeysintobothhosts,byaCAservice,ortheforthcomingsecureDNS(DNSSec)in
ordertodothis.ThisistheprotocolformerlyknownasISAKMP/Oakley,andisdefinedinRFC2409:TheInternet
KeyExchange(IKE) .ApotentialpointofconfusionisthattheacronymsISAKMPandIKEarebothusedin
CiscoIOSsoftwareinordertorefertothesamething.Thesetwoitemsaresomewhatdifferent.
InternetSecurityAssociationandKeyManagementProtocol(ISAKMP)Thisisaprotocolframeworkthat
definesthemechanicsoftheimplementationofakeyexchangeprotocolandnegotiationofasecuritypolicy.
ISAKMPisdefinedintheInternetSecurityAssociationandKeyManagementProtocol(ISAKMP).
IPsecNATTransparencyTheIPsecNATTransparencyfeatureintroducessupportforIPSecurity(IPsec)
traffictotravelthroughNetworkAddressTranslation(NAT)orPointAddressTranslation(PAT)pointsinthe
networkbyaddressingmanyknownincompatibilitiesbetweenNATandIPsec.NATTraversalisafeaturethatis
autodetectedbyVPNdevices.TherearenoconfigurationstepsforarouterthatrunsCiscoIOSSoftware
Release12.2(13)Tandlater.IfbothVPNdevicesareNATTcapable,NATTraversalisautodetectedandauto
negotiated.
ISAKMP/OakleySeeIKE.
MessageDigest5(MD5)Thisisaonewayhashingalgorithmthatproducesa128bithash.BothMD5and
SecureHashAlgorithm(SHA)arevariationsonMD4,whichisdesignedtostrengthenthesecurityofthishashing
algorithm.SHAismoresecurethanMD4andMD5.CiscouseshashesforauthenticationwithintheIPsec
framework.
OakleyThisisakeyexchangeprotocolthatdefineshowtoacquireauthenticatedkeyingmaterial.Thebasic
mechanismforOakleyistheDiffieHellmankeyexchangealgorithm.YoucanfindthestandardinRFC2412:The
OAKLEYKeyDeterminationProtocol .
PerfectForwardSecrecy(PFS)PFSensuresthatagivenIPsecSAkeywasnotderivedfromanyother
secret,likesomeotherkeys.Inotherwords,ifsomeonebreaksakey,PFSensuresthattheattackerisnotable
toderiveanyotherkey.IfPFSisnotenabled,someonecanpotentiallybreaktheIKESAsecretkey,copyallthe
IPsecprotecteddata,andthenuseknowledgeoftheIKESAsecretinordertocompromisetheIPsecSAssetup
bythisIKESA.WithPFS,breakingIKEdoesnotgiveanattackerimmediateaccesstoIPsec.Theattacker
needstobreakeachIPsecSAindividually.TheCiscoIOSIPsecimplementationusesPFSgroup1(DH768bit)
bydefault.
ReplaydetectionThisisasecurityservicewherethereceivercanrejectoldorduplicatepacketsinorderto
defeatreplayattacks.Replayattacksrelyontheattackertosendoutolderorduplicatepacketstothereceiver
andthereceivertothinkthatthebogustrafficislegitimate.Replaydetectionisdonebytheuseofsequence
numberscombinedwithauthentication,andisastandardfeatureofIPsec.
RSAThisisapublickeycryptographicalgorithm,namedafteritsinventors,Rivest,ShamirandAdleman,witha
variablekeylength.ThemainweaknessofRSAisthatitissignificantlyslowtocomputecomparedtopopular
secretkeyalgorithms,suchasDES.CiscoIKEimplementationusesaDiffieHellmanexchangeinordertoget
thesecretkeys.ThisexchangecanbeauthenticatedwithRSA,orpresharedkeys.WiththeDiffieHellman
exchange,theDESkeynevercrossesthenetwork,noteveninencryptedform,whichisnotthecasewiththe
RSAencryptandsigntechnique.RSAisnotapublicdomain,andmustbelicensedfromRSADataSecurity.
SecurityAssociation(SA)Thisisaninstanceofsecuritypolicyandkeyingmaterialappliedtoadataflow.
BothIKEandIPsecuseSAs,althoughSAsareindependentofoneanother.IPsecSAsareunidirectionaland
theyareuniqueineachsecurityprotocol.AsetofSAsareneededforaprotecteddatapipe,oneperdirectionper
protocol.Forexample,ifyouhaveapipethatsupportsESPbetweenpeers,oneESPSAisrequiredforeach
direction.SAsareuniquelyidentifiedbydestination(IPsecendpoint)address,securityprotocol(AHorESP),and
securityparameterindex(SPI).
IKEnegotiatesandestablishesSAsonbehalfofIPsec.AusercanalsoestablishIPsecSAsmanually.
AnIKESAisusedbyIKEonly.UnliketheIPsecSA,itisbidirectional.
SecureHashAlgorithm(SHA)ThisisaonewayhashputforthbyNIST.SHAiscloselymodeledafterMD4
http://www.cisco.com/c/en/us/support/docs/securityvpn/ipsecnegotiationikeprotocols/16439IPSECpart8.html

4/26

12/9/2015

AnIntroductiontoIPSecurity(IPSec)EncryptionCisco

andproducesa160bitdigest.BecauseSHAproducesa160bitdigest,itismoreresistanttobruteforceattacks
than128bithashes(suchasMD5),butitisslower.
SplitTunnelingThisistheprocessofallowingaremoteVPNuserinordertoaccessapublicnetwork,most
commonlytheInternet,atthesametimethattheuserisallowedtoaccessresourcesattheremoteoffice.This
methodofnetworkaccessenablestheusertoaccessremotedevices,suchasanetworkedprinterandservers
atthesametimeastoaccessthepublicnetwork(Internet).Anadvantageoftheuseofsplittunnelingisthatit
alleviatesbottlenecksandconservesbandwidthasInternettrafficdoesnothavetopassthroughtheVPNserver.
AdisadvantageofthismethodisthatitessentiallyrenderstheVPNvulnerabletoattackasitisaccessible
throughthepublic,nonsecurenetwork.
TransformAtransformdescribesasecurityprotocol(AHorESP)withitscorrespondingalgorithms.For
example,ESPwiththeDEScipheralgorithmandHMACSHAforauthentication.
TransportModeThisisanencapsulationmodeforAH/ESP.TransportModeencapsulatestheupperlayer
payload,suchasTransmissionControlProtocol(TCP)orUserDatagramProtocol(UDP),oftheoriginalIP
datagram.Thismodecanonlybeusedwhenthepeersaretheendpointsofthecommunication.Thecontrastof
TransportModeisTunnelMode.
TunnelModeThisistheencapsulationofthecompleteIPDatagramforIPsec.TunnelModeisusedonorder
toprotectdatagramssourcedfromordestinedtononIPsecsystems,suchasinaVirtualPrivateNetwork(VPN)
scenario.

ConfigureISAKMP
IKEexistsonlytoestablishSAsforIPsec.Beforeitcandothis,IKEmustnegotiateanSA(anISAKMPSA)
relationshipwiththepeer.SinceIKEnegotiatesitsownpolicy,itispossibletoconfiguremultiplepolicy
statementswithdifferentconfigurationstatements,thenletthetwohostscometoanagreement.ISAKMP
negotiates:
AnEncryptionAlgorithmThisislimitedto56bitDESonly.
AHashingAlgorithmMD5orSHA
AuthenticationRSAsignatures,RSAEncryptednonces(randomnumbers),orpresharedkeys
LifetimeoftheSAInseconds
Currently,therearetwomethodsusedinordertoconfigureISAKMP:
Usepresharedkeys,whicharesimpletoconfigure.
UseaCA,whichisscalablethroughouttheEnterprise.
Note:IKEnegotiationisdoneonUDP500.IPsecusesIPprotocols50and51.Makesurethesearepermittedon
anyaccesslistsyouhavebetweenthepeers.

1.PreSharedKeys
ThisisthequickanddirtymethodusedinordertoconfigureIKE.WhiletheIKEconfigurationissimpleandyou
donotuseaCA,itdoesnotscaleverywell.
YouneedtodotheseinordertoconfigureIKE:
ConfigureISAKMPprotectionsuite(s).
ConfigureISAKMPkey.

ConfigureISAKMPProtectionSuite(s)
ThiscommandcreatestheISAKMPpolicyobject.Itispossibletohavemultiplepolicies,butthereisonlyonein
thisexample:
dt345a(config)#cryptoisakmppolicy1
http://www.cisco.com/c/en/us/support/docs/securityvpn/ipsecnegotiationikeprotocols/16439IPSECpart8.html

5/26

12/9/2015

AnIntroductiontoIPSecurity(IPSec)EncryptionCisco

dt345a(configisakmp)#

Withthegroupcommand,youcandeclarewhatsizemodulustouseforDiffieHellmancalculation.Group1is
768bitslong,andgroup2is1024bitslong.Whywouldyouuseoneovertheother?Notallvendorssupportgroup
2.Also,group2isalsosignificantlymoreCPUintensivethangroupone.Forthisreason,youdonotwanttouse
group2onlowendroutersliketheCisco2500seriesorless.But,group2ismoresecurethangroup1.Since
thisexampleusesaCisco4500,group2isused,andmakesurethepeerisalsoconfiguredinordertousegroup
2.Thedefaultisgroup1.Ifyouselectthedefaultproperties,thegroup1linesdonotshowupwhenyoudoa
writeterminalcommand.
dt345a(configisakmp)#group2

MD5isourhashingalgorithminthisline.WhiletheimplementationofSHAandMD5arebothmandatory,notall
peerscanbeconfiguredinordertonegotiateoneortheother.ThedefaultinCiscoIOSisSHA,whichismore
securethanMD5.
dt345a(configisakmp)#hashmd5

ThelifetimeoftheSA,500secondsinthiscase,isshowninthiscommand.Ifyoudonotsetalifetime,it
defaultsto86400seconds,oroneday.Whenthelifetimetimerfires,theSAisrenegotiatedasasecurity
measure.
dt345a(configisakmp)#lifetime500

Inthiscommand,IKEismanuallytoldwhatkeytouse.Therefore,thepresharecommandisused.Twooptions
besidesthepresharecommandarethersaencrandthersasigcommands.Thersaencrcommandconfigures
RSAEncryptednoncesandthersasigcommandconfiguresRSASignature.Thersaencrandthersasig
commandsareaddressedintheUseaCAsection.Fornow,rememberthatrsasigisthedefault.
dt345a(configisakmp)#authenticationpreshare

ConfigureISAKMPkey
Inthesecommands,IKEistoldwhatkeytouse.Thepeer,192.168.10.38inthiscase,musthavethesamekey
SlurpeeMachineinitsconfiguration.
dt345a(configisakmp)#exit
dt345a(config)#cryptoisakmpkeySlurpeeMachineaddress192.168.10.38

YouarenowdonewithIKEconfiguration.TheselinesaretheIKEconfigurationofthepeer.Thecomplete
configurationsforbothroutersareintheSampleConfigurationssectionofthisdocument:
cryptoisakmppolicy1
hashmd5
group2
authenticationpreshare
cryptoisakmpkeySlurpeeMachineaddress192.168.10.66

2.UseaCA
TheuseofaCAisacomplexmethodusedinordertoconfigureIKE.SinceitisveryscalableinIPsec,youneed
touseIPsecinsteadofclassiccrypto.WhenCiscoIOSSoftwareRelease11.3(3)isreleased,thereareonly
goingtobeafewCAvendorsthatshipproduct.Initially,mostconfigurationsaredonewiththeuseofpreshared
keys.VeriSign,Entrust,MicrosoftandNetscape,andprobablyahostofothers,areworkingonCAproducts.For
thisexample,aVeriSignCAisused.
YouneedtodotheseinordertouseaCA:
http://www.cisco.com/c/en/us/support/docs/securityvpn/ipsecnegotiationikeprotocols/16439IPSECpart8.html

6/26

12/9/2015

AnIntroductiontoIPSecurity(IPSec)EncryptionCisco

CreateRSAkeypair(s)fortherouter.
RequestCAcertificate.
Enrollcertificatesfortheclientrouter.
ConfigureISAKMPprotectionsuite(s).

CreateRSAKeyPairsfortheRouter
Thecryptokeygenrsausagekeyscommandcanconfuseyou.ThiscommandcreatestwokeypairsforRSA:
onekeypairforencryption
onekeypairfordigitalsignatures
Akeypairreferstoapublickeyanditscorrespondingsecretkey.Ifyoudonotspecifyusagekeysattheendof
thecommand,theroutergeneratesonlyoneRSAkeypairandusesitforbothencryptionanddigitalsignatures.
Asawarning,thatthiscommandcanbeusedinordertocreateDSSkeys.ButDSSisapartofclassiccrypto,
notIPsec.
dt345a(config)#cryptokeygenrsausagekeys
Thenameforthekeyswillbe:dt345a.cisco.com
%YoualreadyhaveRSAkeysdefinedfordt345a.cisco.com.
%Doyoureallywanttoreplacethem?[yes/no]yes

SincesomeRSAkeysalreadyexistonthisbox,itasksifyouwanttogetridofthekeysthatexist.Sincethe
answerisyes,confirmthecommand.Thispromptisreturned:
Choosethesizeofthekeymodulusintherangeof
360to2048foryourSignaturekeys.
Choosingakeymodulusgreaterthan512maytakeafewminutes.
Howmanybitsinthemodulus[512]:<return>
GeneratingRSAkeys...
[OK]
Choosethesizeofthekeymodulusintherangeof
360to2048foryourEncryptionkeys.
Choosingakeymodulusgreaterthan512maytakeafewminutes.
Howmanybitsinthemodulus[512]:<return>
GeneratingRSAkeys...
[OK]
dt345a(config)#

TheRSAkeypairswiththedefault512bitmodulusarenowcreated.Exitoutofconfigmodeandenterashow
cryptokeymypubkeyrsacommand.YoucannowseeyourRSApublickey(s).Theprivatekeyportionofthe
keypairisneverseen.Evenifyoudonothavepreexistingkeys,youseethesamethingfrompreviously.
Note:Remembertosaveyourconfigurationonceyouhavegeneratedyourkeypairs.

RequestaCACertificate
YounowneedtoconfiguretherouterinordertotalktoaCA.Thisinvolvesseveralsteps.Youneedtoeventually
coordinatewithyourCAadministrator.
Intheseconfigurationlines,adomainnameisaddedtotherouter.Thiscreatesahostnameciscocaultra,and
tellstherouterwhatitsIPaddressis,andthenameservers.Youneedtohaveeitherhostnamesdefinedforthe
CAoraDNSthatworksonthebox.CiscorecommendsthatyouhaveaDNSthatworksonthebox.
dt345a(config)#iphostciscocaultra171.69.54.46
dt345a(config)#ipdomainnamecisco.com
dt345a(config)#ipnameserver171.692.132
dt345a(config)#ipnameserver198.92.30.32
http://www.cisco.com/c/en/us/support/docs/securityvpn/ipsecnegotiationikeprotocols/16439IPSECpart8.html

7/26

12/9/2015

AnIntroductiontoIPSecurity(IPSec)EncryptionCisco

StarttoconfiguretheCAparameters.verisigncaisjustanarbitraryname.
dt345a(config)#cryptocaidentityverisignca
dt345a(caidentity)#

Inthisoutput,theCiscoenrollmentprotocolusesHTTPinordertotalktotheCA.Thedt345a(ca
identity)#enrollmenturlhttp://ciscocaultracommandtellstheroutertogotothespecifiedURLinorderto
interactwiththeCA.Thedt345a(caidentity)#cryptocaauthenticateverisigncacommandinstructstherouter
tofetchthecertificateoftheCA.BeforeyoucanenrollintheCA,youneedtomakesureyoutalktotherealCA.
VerifythecertificateoftheCAwiththeCAadministratorinordertoensureauthenticity.
dt345a(caidentity)#enrollmenturlhttp://ciscocaultra
dt345a(caidentity)#exit
dt345a(caidentity)#cryptocaauthenticateverisignca

EnrollCertificatesfortheClientRouter
IssuethecryptocaenrollverisigncacommandinordertobeginenrollmentwiththeCA.Thereareseveral
stepstothis.First,youhavetoverifytheidentityoftheCA,thentheCAhastoverifytheidentityoftherouter.If
youeverneedtorevokeyourcertificatebeforeitexpires,ifyourenumbertheinterfacesofyourrouterorifyou
believethatyourcertificateiscompromised,youneedtoprovideapasswordtotheCAadministrator.Enterthat,
asisillustratedinthisoutput.Afteryouenteryourpassword,theroutercontinues.
dt345a(config)#cryptocaenrollverisignca
%Startcertificateenrollment..
%Createachallengepassword.Youwillneedtoverballyprovidethispassword
totheCAAdministratorinordertorevokeyourcertificate.
Forsecurityreasonsyourpasswordwillnotbesavedintheconfiguration.
Pleasemakeanoteofit.
Password:
Reenterpassword:

Younowseethefingerprint(s)fromtheCA.Verifythatthefingerprint(s)arecorrectwiththeCAadministrator.In
addition,ifyoudoashowcryptocacertcommand,youseetheCAcertificate(s),inadditiontoyourown
certificates.TheCAcertificatesarelistedaspendingatthistime.
%Thesubjectnameforthekeyswillbe:dt345a.cisco.com
%Includetherouterserialnumberinthesubjectname?[yes/no]:yes
%Theserialnumberinthecertificatewillbe:01204044
%IncludeanIPaddressinthesubjectname?[yes/no]:yes
Interface:Ethernet0
RequestcertificatefromCA?[yes/no]:yes

ContacttheCAadministratorbecausethispersonwantstoconfirmtheidentityofthehosebeforeacertificateis
issued.OncetheCAissuesthecertificate,thestatusofourcertificatechangesfrompendingtoavailable.With
this,CAenrollmentiscomplete.But,youarenotdone.YoustillneedtoconfigureISAKMPpolicyobject(s).

ConfigureISAKMPProtectionSuite(s)
Thersasigdefaultisusedinthisoutput.Youcanhavemultipleprotectionsuite(s),butthereisonlyoneinthis
example.Intheeventofmultipleprotectionsuites,thepoliciesarepresentedtothepeerinnumericalorderand
thepeernegotiateswhichonetouse.Youneedtodothisifyouknowthatallofyourpeersdonotsupportcertain
features.Therouterdoesnotattempttonegotiatethingsthatdonotmakesense.Forexample,ifyouconfigure
yourpolicyforrsasigandyouhavenocertificate,therouterdoesnotnegotiatethis.
dt345a(config)#cryptoisakmppolicy1
dt345a(configisakmp)#hashmd5
dt345a(configisakmp)#lifetime4000
http://www.cisco.com/c/en/us/support/docs/securityvpn/ipsecnegotiationikeprotocols/16439IPSECpart8.html

8/26

12/9/2015

AnIntroductiontoIPSecurity(IPSec)EncryptionCisco

dt345a(configisakmp)#exit

ConfigureIPsec
WhetheryouusepresharedkeysorconfigureaCA,onceyousetupInternetKeyExchangeIKE,youstillhaveto
setupIPsec.RegardlessofwhichIKEmethodyouuse,theconfigurationstepsforIPsecarethesame.
YouneedtodotheseinordertoconfigureIPsec:
CreateextendedACL.
CreateIPsectransform(s).
Createcryptomap.
Applycryptomaptotheinterface.

CreateExtendedACL
ThiscommandisaverysimpleACLthatallowstherouterstotalktooneanother,forexample,aTelnetfromone
routertothenext.
dt345a(config)#accesslist101permitiphost192.168.10.38
host192.168.10.66

AmorerealisticACLlookslikethiscommand.ThiscommandisanordinaryextendedACL,where192.168.3.0is
asubnetbehindtherouterinquestion,and10.3.2.0isasubnetsomewherebehindthepeerrouter.Remember
thatpermitmeansencryptanddenymeansdonotencrypt.
dt345a(config)#accesslist101permitip192.168.3.00.0.0.255
10.3.2.00.0.0.255

CreateIPsecTransform(s)
Createthreetransformsets.ThefirstoneusesESPonly,thesecondoneusesAHcombinedwithESP,andthe
lastoneusesonlyAH.DuringIPsecSAnegotiation,allthreeareofferedtothepeer,whichchoosesone.Also,
forallthreetransformsets,usethedefaulttunnelmode.Transportmodecanbeusedonlywhenthecrypto
endpointsarealsotheendpointsofthecommunication.Transpotmodecanbespecifiedbythemodetransport
commandunderthetransformsetconfiguration.TunnelmodeisusedprimarilyfortheVPNscenario.Alsonote
thatesprfc1829andahrfc1828arebasedontheoriginalRFCsforthistechnologyandareobsoletetransforms
includedforbackwardscompatibility.Notallvendorssupportthesetransforms,butothervendorssupportonly
thesetransforms.
Thetransformsetsinthesecommandsarenotnecessarilythemostpractical.Forexample,bothPapaBearand
BabyBearhavesubstandardtransformsets.Useesprfc1829andahrfc1828togetherinthesametransform
set.
dt345a(config)#cryptoipsectransformsetPapaBearesprfc1829
dt345a(cfgcryptotrans)#exit
dt345a(config)#cryptoipsectransformsetMamaBearahmd5hmacespdes
dt345a(cfgcryptotrans)#exit
dt345a(config)#cryptoipsectransformsetBabyBearahrfc1828
dt345a(cfgcryptotrans)#exit
dt345a(config)#

CreateCryptoMap
TheipsecisakmptagtellstherouterthatthiscryptomapisanIPseccryptomap.Althoughthereisonlyone
http://www.cisco.com/c/en/us/support/docs/securityvpn/ipsecnegotiationikeprotocols/16439IPSECpart8.html

9/26

12/9/2015

AnIntroductiontoIPSecurity(IPSec)EncryptionCisco

peerdeclaredinthiscryptomap,youcanhavemultiplepeerswithinagivencryptomap.Thesessionkey
lifetimecanbeexpressedineitherkilobytes(afterxamountoftraffic,changethekey)orseconds,asisshown
inthesecommands.Thegoalofthisistomaketheeffortsofapotentialattackermoredifficult.Theset
transformsetcommandiswhereyouassociatethetransformswiththecryptomap.Inaddition,theorderin
whichyoudeclarethetransformsissignificant.MamaBearismorepreferredinthisconfiguration,andthenthe
restindescendingorderofpreferencethroughtoBabyBear.Thematchaddress101commandmeanstouse
accesslist101inordertodeterminewhichtrafficisrelevant.Youcanhavemultiplecryptomapswiththesame
name,whichisarmadillo,inthisexample,anddifferentsequencenumbers,whichis10,inthisexample.The
combinationofmultiplecryptomapsanddifferentsequencenumbersallowsyoutomixandmatchclassiccrypto
andIPsec.YoucanalsomodifyyourPFSconfigurationhere.PFSgroup1isthedefaultinthisexample.Youcan
changethePFStogroup2,orturnitoffalltogether,whichyoushouldnotdo.
dt345a(config)#cryptomaparmadillo10ipsecisakmp
dt345a(configcryptomap)#setpeer192.168.10.38
dt345a(configcryptomap)#setsessionkeylifetimeseconds4000
dt345a(configcryptomap)#settransformsetMamaBearPapaBearBabyBear
dt345a(configcryptomap)#matchaddress101

ApplyCryptoMaptoInterface
Thesecommandsapplythecryptomaptotheinterface.Youcanassignonlyonecryptomapsettoaninterface.
Ifmultiplecryptomapentrieshavethesamemapnamebutadifferentseqnum,theyarepartofthesameset
andareallappliedtotheinterface.Thesecurityapplianceevaluatesthecryptomapentrywiththelowestseq
numfirst.
dt345a(config)#interfacee0
dt345a(configif)#cryptomaparmadillo

MemoryandCPUConsiderations
PacketsthatareprocessedbyIPsecareslowerthanpacketsthatareprocessedthroughclassiccrypto.There
areseveralreasonsforthisandtheymightcausesignificantperformanceproblems:
IPsecintroducespacketexpansion,whichismorelikelytorequirefragmentationandthecorresponding
reassemblyofIPsecdatagrams.
Encryptedpacketsareprobablyauthenticated,whichmeansthattherearetwocryptographicoperationsthat
areperformedforeverypacket.
Theauthenticationalgorithmsareslow,althoughworkhasbeendonetospeedupthingsastheDiffieHellman
computations.
Inaddition,theDiffieHellmankeyexchangeusedinIKEisanexponentiationofverylargenumbers(between768
and1024bytes)andcantakeuptofoursecondsonaCisco2500.PerformanceofRSAisdependentonthesize
oftheprimenumberchosenfortheRSAkeypair.
Foreachrouter,theSAdatabasetakesupapproximately300bytes,plus120bytesforeverySAtherein.In
situationswheretherearetwoIPsecSAs,oneinboundandoneoutbound,540bytesarerequired,inmostcases.
EachIKESAentryisapproximately64byteseach.TheonlytimeyouhaveoneIPsecSAforadataflowiswhen
thecommunicationisoneway.
IPsecandIKEimpactsperformancewhenactive.DiffieHellmankeyexchanges,publickeyauthentication,and
encryption/decryptionconsumeasignificantamountofresources.Although,muchefforthasbeenmadeinorder
tominimizethisimpact.
Thereisasmalldecreaseinperformancefornonencryptedpacketsthatgothroughaninterfacethatdoescrypto.
Thisisbecauseallpacketshavetobecheckedagainstthecryptomap.Thereisnoperformanceimpacton
packetsthattraversetherouterthatavoidaninterfacethatdoescrypto.Thebiggestimpactisontheencrypted
dataflows.
http://www.cisco.com/c/en/us/support/docs/securityvpn/ipsecnegotiationikeprotocols/16439IPSECpart8.html

10/26

12/9/2015

AnIntroductiontoIPSecurity(IPSec)EncryptionCisco

UseGroup1forDiffieHellmankeyexchangeswithinIKE,useMD5asyourhashingalgorithm,anduselonger
lifetimesinordertominimizetheimpactofthecryptosubsystemontherestoftherouter.Intradeoffforthis
performancetuning,youcangetweakcryptography.Ultimately,itisuptothesecuritypolicyofthecustomerin
ordertodeterminewhichfeaturestouseandwhichtoleavealone.

OutputfromshowCommands
Note:Thecapturesinthesesectionsaretakenfromadifferentseriesofteststhanthoseusedintheprevious
sectionsofthisdocument.Consequently,thesecapturescanhavedifferentIPaddressesandreflectslightly
differentconfigurations.AnotherseriesofshowcommandsisprovidedintheDebugInformationsectionofthis
document.

IKERelatedOutput
StudythesecommandsinordertocheckVeriSignCAenrollment.Thesecommandsshowthepublickeysyou
useforRSAencryptionandsignatures.
dt145a#showcryptokeymypubkeyrsa
%Keypairwasgeneratedat:11:31:59PDTApr91998
Keyname:dt145a.cisco.com
Usage:SignatureKey
KeyData:
305C300D06092A864886F70D0101010500034B003048024100C11854
39A9C75C
4E34C987B4D7F36CA058D69713172767192166E1661483DD0FDB907B
F9C10B7A
CB5A034FA41DF38523BEB6A7C14344BEE6915A121C86374F830203010001
%Keypairwasgeneratedat:11:32:02PDTApr91998
Keyname:dt145a.cisco.com
Usage:EncryptionKey
KeyData:
305C300D06092A864886F70D0101010500034B003048024100DCF5AC
360DD5A6
C69704CF47B2362D65123BD4424B6FF6AD10C33E89983D0816F1EA58
3700BCF9
1EF17E715931A9FC18D60D9AE0852DDD3F25369CF09DFB75050203010001

Thiscommandshowsthecertificatesthattherouterrecognizes.Acertificatethathaspendingstatushasbeen
submittedtotheCAforapproval.
dt145a#showcryptocacertificates
Certificate
SubjectName
Name:dt145a.cisco.com
SerialNumber:01193485
Status:Available
CertificateSerialNumber:650534996414E2BE701F4EF3170EDFAD
KeyUsage:Signature

CACertificate
Status:Available
CertificateSerialNumber:3051DF7169BEE31B821DFE4B3A338E5F
KeyUsage:NotSet
Certificate
SubjectName
Name:dt145a.cisco.com
SerialNumber:01193485
Status:Available
CertificateSerialNumber:1e621faf3b9902bc5b49d0f99dc66d14
KeyUsage:Encryption
http://www.cisco.com/c/en/us/support/docs/securityvpn/ipsecnegotiationikeprotocols/16439IPSECpart8.html

11/26

12/9/2015

AnIntroductiontoIPSecurity(IPSec)EncryptionCisco

Thisoutputshowsthepublickeysoftherouterandwheretherouterlearnedaboutthem.
dt145a#showcryptokeypubkeychainrsa
Codes:MManuallyconfigured,CExtractedfromcertificate

CodeUsageIPAddressName
CSigningCiscoSystemsDevtestCISCOCAULTRA
CGeneral172.21.30.71dt17ka.cisco.com

ThisistheISAKMP(IKE)SAtable.HereyouseethatanSAcurrentlyexistsbetween172.21.30.71and
172.21.30.70.ThepeerneedstohaveanSAentryinthesamestateastheoutputofthisrouter.
dt17ka#showcryptoisakmpsa
dstsrcstateconnidslot
172.21.30.70172.21.30.71QM_IDLE475

Theselinesshowthepolicyobjectsconfigured.Inthiscase,policies1,2,and4areused,inadditiontothe
default.Thepoliciesareproposedtothepeerinorder,with1asthemostpreferred.
dt145a#showcryptoisakmppolicy
Protectionsuiteofpriority1
encryptionalgorithm:DESDataEncryptionStandard(56bit
keys).
hashalgorithm:MessageDigest5
authenticationmethod:RivestShamirAdlemanSignature
DiffieHellmangroup:#1(768bit)
lifetime:180seconds,novolumelimit
Protectionsuiteofpriority2
encryptionalgorithm:DESDataEncryptionStandard(56bitkeys).
hashalgorithm:SecureHashStandard
authenticationmethod:PreSharedKey
DiffieHellmangroup:#2(1024bit)
lifetime:180seconds,novolumelimit
Protectionsuiteofpriority4
encryptionalgorithm:DESDataEncryptionStandard(56bitkeys).
hashalgorithm:MessageDigest5
authenticationmethod:PreSharedKey
DiffieHellmangroup:#2(1024bit)
lifetime:180seconds,novolumelimit
Defaultprotectionsuite
encryptionalgorithm:DESDataEncryptionStandard(56bitkeys).
hashalgorithm:SecureHashStandard
authenticationmethod:RivestShamirAdlemanSignature
DiffieHellmangroup:#1(768bit)
lifetime:86400seconds,novolumelimit

IPsecRelatedshowCommands
ThiscommandshowsthecryptomapToOtherRouter,theACLs,andthetransformproposalsappliedtothis
cryptomap,thepeers,andthekeylifetime.
S325132#showcryptomap
CryptoMap"ToOtherRouter"10ipsecisakmp
Peer=192.168.1.1
ExtendedIPaccesslist101
accesslist101permitip
source:addr=192.168.45.0/0.0.0.255
dest:addr=192.168.3.0/0.0.0.255
ConnectionId=UNSET(0established,0failed)
Currentpeer:192.168.1.1
http://www.cisco.com/c/en/us/support/docs/securityvpn/ipsecnegotiationikeprotocols/16439IPSECpart8.html

12/26

12/9/2015

AnIntroductiontoIPSecurity(IPSec)EncryptionCisco

Sessionkeylifetime:4608000kilobytes/3600seconds
PFS(Y/N):N
Transformproposals={Elvis,Bubba,BarneyDino,}

Thisconfigurationusesthesamerouterasthepreviousoutput,butdifferentcommands.Youseealltransform
proposals,whichsettingstheynegotiate,andthedefaults.
S325132#showcryptoipsectransformset
TransformproposalElvis:{ahshahmac}
supportedsettings={Tunnel,},
defaultsettings={Tunnel,},
willnegotiate={Tunnel,},

{espdes}
supportedsettings={Tunnel,},
defaultsettings={Tunnel,},
willnegotiate={Tunnel,},

TransformproposalBubba:{ahrfc1828}
supportedsettings={Tunnel,},
defaultsettings={Tunnel,},
willnegotiate={Tunnel,},

{espdesespmd5hmac}
supportedsettings={Tunnel,},
defaultsettings={Tunnel,},
willnegotiate={Tunnel,},

TransformproposalBarneyDino:{ahmd5hmac}
supportedsettings={Tunnel,},
defaultsettings={Tunnel,},
willnegotiate={Tunnel,},

ThiscommandshowsthecurrentIPsecSecurityAssociationsofthisrouter.TherouterhasoneAHSAforboth
incomingandoutgoing.
S325132#showcryptoipsession
Sessionkeylifetime:4608000kilobytes/3600seconds
S325132#showcryptoipsecsa

interface:Ethernet0
Cryptomaptag:ToOtherRouter,localaddr.192.168.1.2

localident(addr/mask/prot/port):(192.168.45.0/255.255.255.0/0/0)
remoteident(addr/mask/prot/port):(192.168.3.0/255.255.255.0/0/0)
current_peer:192.168.1.1
PERMIT,flags={origin_is_acl,}
#pktsencaps:0,#pktsencrypt:0,#pktsdigest0
#pktsdecaps:0,#pktsdecrypt:0,#pktsverify0
#senderrors5,#recverrors0

localcryptoendpt.:192.168.1.2,remotecryptoendpt.:192.168.1.1
pathmtu1500,mediamtu1500
currentoutboundspi:25081A81
inboundespsas:

inboundahsas:
spi:0x1EE91DDC(518594012)
transform:ahmd5hmac,
inusesettings={Tunnel,}
slot:0,connid:16,cryptomap:ToOtherRouter
http://www.cisco.com/c/en/us/support/docs/securityvpn/ipsecnegotiationikeprotocols/16439IPSECpart8.html

13/26

12/9/2015

AnIntroductiontoIPSecurity(IPSec)EncryptionCisco

satiming:remainingkeylifetime(k/sec):(4608000/3423)
replaydetectionsupport:Y

outboundespsas:

outboundahsas:
spi:0x25081A81(621288065)
transform:ahmd5hmac,
inusesettings={Tunnel,}
slot:0,connid:17,cryptomap:ToOtherRouter
satiming:remainingkeylifetime(k/sec):(4608000/3424)
replaydetectionsupport:Y

SampleConfigurations
Thisconfigurationusespresharedkeys.Thisrouterconfigurationisusedinordertocreatethedebugoutput
listedintheDebugInformationsection.ThisconfigurationallowsanetworkcalledXlocatedbehindSourceRouter
totalktoanetworkcalledYlocatedbehindPeerRouter.ConsulttheCiscoIOSSoftwaredocumentationforyour
versionofCiscoIOS,orusetheCommandLookupTool(registeredcustomersonly)formoreinformationabouta
particularcommand.Thistoolallowstheusertolookupadetaileddescriptionorconfigurationguidelinesfora
particularcommand.

NetworkDiagram

Configurations
SourceRouter
PeerRouter
http://www.cisco.com/c/en/us/support/docs/securityvpn/ipsecnegotiationikeprotocols/16439IPSECpart8.html

14/26

12/9/2015

AnIntroductiontoIPSecurity(IPSec)EncryptionCisco

SourceRouter
Currentconfiguration:
!
version11.3
servicetimestampsdebuguptime
servicetimestampsloguptime
noservicepasswordencryption
!
hostnamegosse42513
!
enablesecret5$1$ZuRD$YBaAh3oIv4iltIn0TMCUX1
enablepasswordww
!
!IKEconfiguration
cryptoisakmppolicy1
hashmd5
authenticationpreshare
cryptoisakmpkeySlurpeeMachineaddress20.20.20.21
!
!IPsecconfiguration
cryptoipsectransformsetBearPapaesprfc1829
cryptoipsectransformsetBearMamaahmd5hmacespdes
cryptoipsectransformsetBearBabyahrfc1828
!
cryptomaparmadillo1ipsecisakmp
setpeer20.20.20.21
setsecurityassociationlifetimeseconds190
settransformsetBearPapaBearMamaBearBaby
!Traffictoencrypt
matchaddress101
!
interfaceEthernet0
ipaddress60.60.60.60255.255.255.0
nomopenabled
!
interfaceSerial0
ipaddress20.20.20.20255.255.255.0
noipmroutecache
nofairqueue
cryptomaparmadillo
!
interfaceSerial1
noipaddress
shutdown
!
interfaceTokenRing0
noipaddress
shutdown
!
ipclassless
iproute0.0.0.00.0.0.020.20.20.21
!Traffictoencrypt
accesslist101permitip60.60.60.00.0.0.25550.50.50.00.0.0.
255
dialerlist1protocolippermit
http://www.cisco.com/c/en/us/support/docs/securityvpn/ipsecnegotiationikeprotocols/16439IPSECpart8.html

15/26

12/9/2015

AnIntroductiontoIPSecurity(IPSec)EncryptionCisco

dialerlist1protocolipxpermit
!
linecon0
exectimeout00
lineaux0
linevty04
passwordww
login
!
end

PeerRouter
Currentconfiguration:
!
version11.3
servicetimestampsdebuguptime
servicetimestampsloguptime
noservicepasswordencryption
!
hostnamegossc22513
!
enablesecret5$1$DBTl$Wtg2eS7Eb/Cw5l.nDhkEi/
enablepasswordww
!
ipsubnetzero
!
!IKEconfiguration
cryptoisakmppolicy1
hashmd5
authenticationpreshare
cryptoisakmpkeySlurpeeMachineaddress20.20.20.20
!
!IPsecconfiguration
cryptoipsectransformsetPapaBearesprfc1829
cryptoipsectransformsetMamaBearahmd5hmacespdes
cryptoipsectransformsetBabyBearahrfc1828
!
!
cryptomaparmadillo1ipsecisakmp
setpeer20.20.20.20
setsecurityassociationlifetimeseconds190
settransformsetMamaBearPapaBearBabyBear

!Traffictoencrypt
matchaddress101
!
!
!
interfaceEthernet0
ipaddress50.50.50.50255.255.255.0
noipdirectedbroadcast
!
interfaceSerial0
ipaddress20.20.20.21255.255.255.0
noipdirectedbroadcast
http://www.cisco.com/c/en/us/support/docs/securityvpn/ipsecnegotiationikeprotocols/16439IPSECpart8.html

16/26

12/9/2015

AnIntroductiontoIPSecurity(IPSec)EncryptionCisco

noipmroutecache
nofairqueue
clockrate9600
cryptomaparmadillo
!
interfaceSerial1
noipaddress
noipdirectedbroadcast
shutdown
!
interfaceTokenRing0
noipaddress
noipdirectedbroadcast
shutdown
!
ipclassless
iproute0.0.0.00.0.0.020.20.20.20
!Traffictoencrypt
accesslist101permitip50.50.50.00.0.0.25560.60.60.00.0.0.
255
dialerlist1protocolippermit
dialerlist1protocolipxpermit
!
!
linecon0
exectimeout00
transportinputnone
lineaux0
lineaux0
linevty04
passwordww
login
!
end

DebugInformation
ThissectionhasthedebugoutputfromanormalIKE/IPsecsessionbetweentworouters.Theconfigurations
comefromtheSampleConfigurationssectionofthisdocument.Theroutersuseapresharedkey.Bothrouters
havethedebugcryptoisakmp,debugcryptoipsec,anddebugcryptoenginecommandsenabled.Thiswas
testedwithanextendedpingfromtheSourceRouterethernetinterfacetothePeerRouterethernetinterface
(60.60.60.60to50.50.50.50).
Note:Theblue,italicstatementsinthissampledebugoutputarenotestohelpyoufollowwhathappens,theyare
notpartofthedebugoutput.
SourceRouter
SourceRoutershowCommandOutputAfterIKE/IPsecNegotiation
PeerRouterwithSamePingSequence,asSeenfromtheOtherSide
PeerRoutershowCommands

gosse42513#showclock
gosse42513#ping
Protocol[ip]:
TargetIPaddress:50.50.50.50
http://www.cisco.com/c/en/us/support/docs/securityvpn/ipsecnegotiationikeprotocols/16439IPSECpart8.html

17/26

12/9/2015

AnIntroductiontoIPSecurity(IPSec)EncryptionCisco

Repeatcount[5]:10
Datagramsize[100]:
Timeoutinseconds[2]:
Extendedcommands[n]:y
Sourceaddressorinterface:60.60.60.60
Typeofservice[0]:
SetDFbitinIPheader?[no]:
Validatereplydata?[no]:
Datapattern[0xABCD]:
Loose,Strict,Record,Timestamp,Verbose[none]:
Sweeprangeofsizes[n]:
Typeescapesequencetoabort.
Sending10,100byteICMPEchosto50.50.50.50,timeoutis2seconds:
Apr212:03:55.347:IPSEC(sa_request):,
(keyeng.msg.)src=20.20.20.20,dest=20.20.20.21,
src_proxy=60.60.60.0/255.255.255.0/0/0(type=4),
dest_proxy=50.50.50.0/255.255.255.0/0/0(type=4),
protocol=ESP,transform=esprfc1829,
lifedur=190sand4608000kb,
spi=0x0(0),conn_id=0,keysize=0,flags=0x4004
Apr212:03:55.355:IPSEC(sa_request):,
(keyeng.msg.)src=20.20.20.20,dest=20.20.20.21,
src_proxy=60.60.60.0/255.255.255.0/0/0(type=4),
dest_proxy=50.50.50.0/255.255.255.0/0/0(type=4),
protocol=AH,transform=ahmd5hmac,
lifedur=190sand4608000kb,
spi=0x0(0),conn_id=0,keysize=0,flags=0x4004
Apr212:03:55.363:IPSEC(sa_request):,
(keyeng.msg.)src=20.20.20.20,dest=20.20.20.21,
src_proxy=60.60.60.0/255.255.255.0/0/0(type=4),
dest_proxy=50.50.50.0/255.255.255.0/0/0(type=4),
protocol=ESP,transform=espdes,
lifedur=190sand4608000kb,
spi=0x0(0),conn_id=0,keysi.ze=0,flags=0x4004
Apr212:03:55.375:IPSEC(sa_request):,
(keyeng.msg.)src=20.20.20.20,dest=20.20.20.21,
src_proxy=60.60.60.0/255.255.255.0/0/0(type=4),
dest_proxy=50.50.50.0/255.255.255.0/0/0(type=4),
protocol=AH,transform=ahrfc1828,
lifedur=190sand4608000kb,
spi=0x0(0),conn_id=0,keysize=0,flags=0x4004

!Notethattherouterofferstothepeerallofthe!availabletransforms.

Apr212:03:55.391:ISAKMP(14):beginningMainModeexchange
Apr212:03:57.199:ISAKMP(14):processingSApayload.messageID=0
Apr212:03:57.203:ISAKMP(14):CheckingISAKMPtransform1against
priority1policy
Apr212:03:57.203:ISAKMP:encryptionDESCBC
Apr212:03:57.207:ISAKMP:hashMD5
Apr212:03:57.207:ISAKMP:defaultgroup1
Apr212:03:57.207:ISAKMP:authpreshare
Apr212:03:57.211:ISAKMP(14):attsareacceptable.Nextpayloadis0
Apr212:03:57.215:Cryptoengine0:generatealgparam
Apr212:03:5.8.867:CRYPTO_ENGINE:Dhphase1status:0
Apr212:03:58.871:ISAKMP(14):SAisdoingpresharedkeyauthentication..
Apr212:04:01.291:ISAKMP(14):processingKEpayload.messageID=0
Apr212:04:01.295:Cryptoengine0:generatealgparam
Apr212:04:03.343:ISAKMP(14):processingNONCEpayload.messageID=0
Apr212:04:03.347:Cryptoengine0:createISAKMPSKEYIDforconnid14
http://www.cisco.com/c/en/us/support/docs/securityvpn/ipsecnegotiationikeprotocols/16439IPSECpart8.html

18/26

12/9/2015

AnIntroductiontoIPSecurity(IPSec)EncryptionCisco

Apr212:04:03.363:ISAKMP(14):SKEYIDstategenerated
Apr212:04:03.367:ISAKMP(14):processingvendoridpayload
Apr212:04:03.371:ISAKMP(14):speakingtoanotherIOSbox!
Apr212:04:03.371:generatehmaccontextforconnid14
Apr212:04:03.615:ISAKMP(14):processingIDpayload.messageID=0
Apr212:04:03.615:ISAKMP(14):processingHASHpayload.messageID=0
Apr212:04:03.619:generatehmaccontextforconnid14
Apr212:04:03.627:ISAKMP(14):SAhasbeenauthenticated
Apr212:04:03.627:ISAKMP(14):beginningQuickModeexchange,MIDof1628162439

!Theselinesrepresentverificationthatthepolicy!attributesarefine,andthefinalauthent
iation:

Apr212:04:03.635:IPSEC(key_engine):gotaqueueevent...
Apr212:04:03.635:IPSEC(spi_response):gettingspi303564824ldforSA
.!!!from20.20.20.21to20.20.20.20forprot3
Apr212:04:03.639:IPSEC(spi_response):gettingspi423956280ldforSA
from20.20.20.21to20.20.20.20forprot2
Apr212:04:03.643:IPSEC(spi_response):gettingspi415305621ldforSA
from20.20.20.21to20.20.20.20forprot3
Apr212:04:03.647:IPSEC(spi_response):gettingspi218308976ldforSA
from20.20.20.21to20.20.20.20forprot2
Apr212:04:03.891:generatehmaccontextforconnid14
Apr212:04:04.!!
Successrateis50percent(5/10),roundtripmin/avg/max=264/265/268ms
gosse42513#723:generatehmaccontextforconnid14
Apr212:04:04.731:ISAKMP(14):processingSApayload.messageID=1628162439
Apr212:04:04.731:ISAKMP(14):CheckingIPSecproposal1
Apr212:04:04.735:ISAKMP:transform1,ESP_DES_IV64
Apr212:04:04.735:ISAKMP:attributesintransform:
Apr212:04:04.735:ISAKMP:encapsis1
Apr212:04:04.739:ISAKMP:SAlifetypeinseconds
Apr212:04:04.739:ISAKMP:SAlifeduration(basic)of190
Apr212:04:04.739:ISAKMP:SAlifetypeinkilobytes
Apr212:04:04.743:ISAKMP:SAlifeduration(VPI)of0x00x460x500x0
Apr212:04:04.747:ISAKMP(14):attsareacceptable.

!TheISAKMPdebugislistedbecauseIKEisthe!entitythatnegotiatesIPsecSAsonbehalfofI

Apr212:04:04.747:IPSEC(validate_proposal_request):proposalpart#1,
(keyeng.msg.)dest=20.20.20.21,src=20.20.20.20,
dest_proxy=50.50.50.0/255.255.255.0/0/0(type=4),
src_proxy=60.60.60.0/255.255.255.0/0/0(type=4),
protocol=ESP,transform=esprfc1829,
lifedur=0sand0kb,
spi=0x0(0),conn_id=0,keysize=0,flags=0x4
Apr212:04:04.759:ISAKMP(14):processingNONCEpayload.messageID=1628162439
Apr212:04:04.759:ISAKMP(14):processingIDpayload.messageID=1628162439
Apr212:04:04.763:ISAKMP(14):processingIDpayload.messageID=1628162439
Apr212:04:04.767:generatehmaccontextforconnid14
Apr212:04:04.799:ISAKMP(14):CreatingIPSecSAs
Apr212:04:04.803:inboundSAfrom20.20.20.21to20.20.20.20
(proxy50.50.50.0to60.60.60.0)
Apr212:04:04.803:hasspi303564824andconn_id15andflags4
Apr212:04:04.807:lifetimeof190seconds
Apr212:04:04.807:lifetimeof4608000kilobytes
Apr212:04:04.811:outboundSAfrom20.20.20.20to20.20.20.21
(proxy60.60.60.0to50.50.50.0)
Apr212:04:04.811:hasspi183903875andconn_id16andflags4
Apr212:04:04.815:lifetimeof190seconds
Apr212:04:04.815:lifetimeof4608000kilobytes
http://www.cisco.com/c/en/us/support/docs/securityvpn/ipsecnegotiationikeprotocols/16439IPSECpart8.html

19/26

12/9/2015

AnIntroductiontoIPSecurity(IPSec)EncryptionCisco

Apr212:04:04.823:IPSEC(key_engine):gotaqueueevent...
Apr212:04:04.823:IPSEC(initialize_sas):,
(keyeng.msg.)dest=20.20.20.20,src=20.20.20.21,
dest_proxy=60.60.60.0/255.255.255.0/0/0(type=4),
src_proxy=50.50.50.0/255.255.255.0/0/0(type=4),
protocol=ESP,transform=esprfc1829,
lifedur=190sand4608000kb,
spi=0x12180818(303564824),conn_id=15,keysize=0,flags=0x4
Apr212:04:04.831:IPSEC(initialize_sas):,
(keyeng.msg.)src=20.20.20.20,dest=20.20.20.21,
src_proxy=60.60.60.0/255.255.255.0/0/0(type=4),
dest_proxy=50.50.50.0/255.255.255.0/0/0(type=4),
protocol=ESP,transform=esprfc1829,
lifedur=190sand4608000kb,
spi=0xAF62683(183903875),conn_id=16,keysize=0,flags=0x4
Apr212:04:04.839:IPSEC(create_sa):sacreated,
(sa)sa_dest=20.20.20.20,sa_prot=50,
sa_spi=0x12180818(303564824),
sa_trans=esprfc1829,sa_conn_id=15
Apr212:04:04.843:IPSEC(create_sa):sacreated,
(sa)sa_dest=20.20.20.21,sa_prot=50,
sa_spi=0xAF62683(183903875),
sa_trans=esprfc1829,sa_conn_id=16

!TheselinesshowthatIPsecSAsarecreatedand!encryptedtrafficcannowpass.

SourceRoutershowCommandOutputAfterIKE/IPsecNegotiation
gosse42513#
gosse42513#showcryptoisakmpsa
dstsrcstateconnidslot
20.20.20.2120.20.20.20QM_IDLE140
gosse42513#showcryptoipsecsa
interface:Serial0
Cryptomaptag:armadillo,localaddr.20.20.20.20
localident(addr/mask/prot/port):(60.60.60.0/255.255.255.0/0/0)
remoteident(addr/mask/prot/port):(50.50.50.0/255.255.255.0/0/0)
current_peer:20.20.20.21
PERMIT,flags={origin_is_acl,}
#pktsencaps:5,#pktsencrypt:5,#pktsdigest0
#pktsdecaps:5,#pktsdecrypt:5,#pktsverify0
#senderrors5,#recverrors0
localcryptoendpt.:20.20.20.20,remotecryptoendpt.:20.20.20.21
pathmtu1500,mediamtu1500
currentoutboundspi:AF62683
inboundespsas:
spi:0x12180818(303564824)
transform:esprfc1829,
inusesettings={VarlenIV,Tunnel,}
slot:0,connid:15,cryptomap:armadillo
satiming:remainingkeylifetime(k/sec):(4607999/135)
IVsize:8bytes
replaydetectionsupport:N

http://www.cisco.com/c/en/us/support/docs/securityvpn/ipsecnegotiationikeprotocols/16439IPSECpart8.html

20/26

12/9/2015

AnIntroductiontoIPSecurity(IPSec)EncryptionCisco

inboundahsas:

outboundespsas:
spi:0xAF62683(183903875)
transform:esprfc1829,
inusesettings={VarlenIV,Tunnel,}
slot:0,connid:16,cryptomap:armadillo
satiming:remainingkeylifetime(k/sec):(4607999/117)
IVsize:8bytes
replaydetectionsupport:N

outboundahsas:

gosse42513#showcryptoisakmppolicy
Protectionsuiteofpriority1
encryptionalgorithm:DESDataEncryptionStandard(56bitkeys).
hashalgorithm:MessageDigest5
authenticationmethod:PreSharedKey
DiffieHellmangroup:#1(768bit)
lifetime:86400seconds,novolumelimit
Defaultprotectionsuite
encryptionalgorithm:DESDataEncryptionStandard(56bitkeys).
hashalgorithm:SecureHashStandard
authenticationmethod:RivestShamirAdlemanSignature
DiffieHellmangroup:#1(768bit)
lifetime:86400seconds,novolumelimit
gosse42513#showcryptomap
CryptoMap"armadillo"1ipsecisakmp
Peer=20.20.20.21
ExtendedIPaccesslist101
accesslist101permitip60.60.60.00.0.0.25550.50.50.00.0.0.
255
Currentpeer:20.20.20.21
Securityassociationlifetime:4608000kilobytes/190seconds
PFS(Y/N):N
Transformsets={BearPapa,BearMama,BearBaby,}

PeerRouterwithSamePingSequence,asSeenfromtheOtherSide
gossc22513#showdebug
CryptographicSubsystem:
CryptoISAKMPdebuggingison
CryptoEnginedebuggingison
CryptoIPSECdebuggingison
gossc22513#
Apr212:03:55.107:ISAKMP(14):processingSApayload.messageID=0
Apr212:03:55.111:ISAKMP(14):CheckingISAKMPtransform1against
priority1policy
Apr212:03:55.111:ISAKMP:encryptionDESCBC
Apr212:03:55.111:ISAKMP:hashMD5
Apr212:03:55.115:ISAKMP:defaultgroup1
Apr212:03:55.115:ISAKMP:authpreshare
Apr212:03:55.115:ISAKMP(14):attsareacceptable.Nextpayloadis0

!IKEperformsitsoperation,andthenkicksoffIPsec.

http://www.cisco.com/c/en/us/support/docs/securityvpn/ipsecnegotiationikeprotocols/16439IPSECpart8.html

21/26

12/9/2015

AnIntroductiontoIPSecurity(IPSec)EncryptionCisco

Apr212:03:55.119:Cryptoengine0:generatealgparam
Apr212:03:56.707:CRYPTO_ENGINE:Dhphase1status:0
Apr212:03:56.711:ISAKMP(14):SAisdoingpresharedkeyauthentication
Apr212:03:58.667:ISAKMP(14):processingKEpayload.messageID=0
Apr212:03:58.671:Cryptoengine0:generatealgparam
Apr212:04:00.687:ISAKMP(14):processingNONCEpayload.messageID=0
Apr212:04:00.695:Cryptoengine0:createISAKMPSKEYIDforconnid14
Apr212:04:00.707:ISAKMP(14):SKEYIDstategenerated
Apr212:04:00.711:ISAKMP(14):processingvendoridpayload
Apr212:04:00.715:ISAKMP(14):speakingtoanotherIOSbox!
Apr212:04:03.095:ISAKMP(14):processingIDpayload.messageID=0
Apr212:04:03.095:ISAKMP(14):processingHASHpayload.messageID=0
Apr212:04:03.099:generatehmaccontextforconnid14
Apr212:04:03.107:ISAKMP(14):SAhasbeenauthenticated
Apr212:04:03.111:generatehmaccontextforconnid14
Apr212:04:03.835:generatehmaccontextforconnid14
Apr212:04:03.839:ISAKMP(14):processingSApayload.messageID=1628162439
Apr212:04:03.843:ISAKMP(14):CheckingIPSecproposal1
Apr212:04:03.843:ISAKMP:transform1,ESP_DES_IV64
Apr212:04:03.847:ISAKMP:attributesintransform:
Apr212:04:03.847:ISAKMP:encapsis1
Apr212:04:03.847:ISAKMP:SAlifetypeinseconds
Apr212:04:03.851:ISAKMP:SAlifeduration(basic)of190
Apr212:04:03.851:ISAKMP:SAlifetypeinkilobytes
Apr212:04:03.855:ISAKMP:SAlifeduration(VPI)of0x00x460x500x0
Apr212:04:03.855:ISAKMP(14):attsareacceptable.
Apr212:04:03.859:IPSEC(validate_proposal_request):proposalpart#1,
(keyeng.msg.)dest=20.20.20.21,src=20.20.20.20,
dest_proxy=50.50.50.0/255.255.255.0/0/0(type=4),
src_proxy=60.60.60.0/255.255.255.0/0/0(type=4),
protocol=ESP,transform=esprfc1829,
lifedur=0sand0kb,
spi=0x0(0),conn_id=0,keysize=0,flags=0x4
Apr212:04:03.867:ISAKMP(14):processingNONCEpayload.messageID=1628162
439
Apr212:04:03.871:ISAKMP(14):processingIDpayload.messageID=1628162439
Apr212:04:03.871:ISAKMP(14):processingIDpayload.messageID=1628162439
Apr212:04:03.879:IPSEC(key_engine):gotaqueueevent...
Apr212:04:03.879:IPSEC(spi_response):gettingspi183903875ldforSA
from20.20.20.20to20.20.20.21forprot3
Apr212:04:04.131:generatehmaccontextforconnid14
Apr212:04:04.547:generatehmaccontextforconnid14
Apr212:04:04.579:ISAKMP(14):CreatingIPSecSAs
Apr212:04:04.579:inboundSAfrom20.20.20.20to20.20.20.21
(proxy60.60.60.0to50.50.50.0)
Apr212:04:04.583:hasspi183903875andconn_id15andflags4
Apr212:04:04.583:lifetimeof190seconds
Apr212:04:04.587:lifetimeof4608000kilobytes
Apr212:04:04.587:outboundSAfrom20.20.20.21to20.20.20.20
(proxy50.50.50.0to60.60.60.0)
Apr212:04:04.591:hasspi303564824andconn_id16andflags4
Apr212:04:04.591:lifetimeof190seconds
Apr212:04:04.595:lifetimeof4608000kilobytes
Apr212:04:04.599:IPSEC(key_engine):gotaqueueevent...
Apr212:04:04.599:IPSEC(initialize_sas):,
(keyeng.msg.)dest=20.20.20.21,src=20.20.20.20,
dest_proxy=50.50.50.0/255.255.255.0/0/0(type=4),
src_proxy=60.60.60.0/255.255.255.0/0/0(type=4),
protocol=ESP,transform=esprfc1829,
lifedur=190sand4608000kb,
spi=0xAF62683(183903875),conn_id=15,keysize=0,flags=0x4
Apr212:04:04.607:IPSEC(initialize_sas):,
http://www.cisco.com/c/en/us/support/docs/securityvpn/ipsecnegotiationikeprotocols/16439IPSECpart8.html

22/26

12/9/2015

AnIntroductiontoIPSecurity(IPSec)EncryptionCisco

(keyeng.msg.)src=20.20.20.21,dest=20.20.20.20,
src_proxy=50.50.50.0/255.255.255.0/0/0(type=4),
dest_proxy=60.60.60.0/255.255.255.0/0/0(type=4),
protocol=ESP,transform=esprfc1829,
lifedur=190sand4608000kb,
spi=0x12180818(303564824),conn_id=16,keysize=0,flags=0x4
Apr212:04:04.615:IPSEC(create_sa):sacreated,
(sa)sa_dest=20.20.20.21,sa_prot=50,
sa_spi=0xAF62683(183903875),
sa_trans=esprfc1829,sa_conn_id=15
Apr212:04:04.619:IPSEC(create_sa):sacreated,
(sa)sa_dest=20.20.20.20,sa_prot=50,
sa_spi=0x12180818(303564824),
sa_trans=esprfc1829,sa_conn_id=16

!TheIPsecSAsarecreated,andICMPtrafficcanflow.

PeerRoutershowCommands

!Thisillustratesaseriesofshowcommandoutputafter!IKE/IPsecnegotiationtakespla
ce.

gossc22513#showcryptoisakmpsa
dstsrcstateconnidslot
20.20.20.2120.20.20.20QM_IDLE140
gossc22513#showcryptoipsecsa
interface:Serial0
Cryptomaptag:armadillo,localaddr.20.20.20.21
localident(addr/mask/prot/port):(50.50.50.0/255.255.255.0/0/0)
remoteident(addr/mask/prot/port):(60.60.60.0/255.255.255.0/0/0)
current_peer:20.20.20.20
PERMIT,flags={origin_is_acl,}
#pktsencaps:5,#pktsencrypt:5,#pktsdigest0
#pktsdecaps:5,#pktsdecrypt:5,#pktsverify0
#senderrors0,#recverrors0
localcryptoendpt.:20.20.20.21,remotecryptoendpt.:20.20.20.20
pathmtu1500,mediamtu1500
currentoutboundspi:12180818
inboundespsas:
spi:0xAF62683(183903875)
transform:esprfc1829,
inusesettings={VarlenIV,Tunnel,}
slot:0,connid:15,cryptomap:armadillo
satiming:remainingkeylifetime(k/sec):(4607999/118)
IVsize:8bytes
replaydetectionsupport:N

inboundahsas:

outboundespsas:
spi:0x12180818(303564824)
http://www.cisco.com/c/en/us/support/docs/securityvpn/ipsecnegotiationikeprotocols/16439IPSECpart8.html

23/26

12/9/2015

AnIntroductiontoIPSecurity(IPSec)EncryptionCisco

transform:esprfc1829,
inusesettings={VarlenIV,Tunnel,}
slot:0,connid:16,cryptomap:armadillo
satiming:remainingkeylifetime(k/sec):(4607999/109)
IVsize:8bytes
replaydetectionsupport:N

outboundahsas:

gossc22513#showcryptoisakmppolicy
Protectionsuiteofpriority1
encryptionalgorithm:DESDataEncryptionStandard(56bitkeys).
hashalgorithm:MessageDigest5
authenticationmethod:PreSharedKey
DiffieHellmangroup:#1(768bit)
lifetime:86400seconds,novolumelimit
Defaultprotectionsuite
encryptionalgorithm:DESDataEncryptionStandard(56bitkeys).
hashalgorithm:SecureHashStandard
authenticationmethod:RivestShamirAdlemanSignature
DiffieHellmangroup:#1(768bit)
lifetime:86400seconds,novolumelimit
gossc22513#showcryptomap
CryptoMap"armadillo"1ipsecisakmp
Peer=20.20.20.20
ExtendedIPaccesslist101
accesslist101permitip50.50.50.00.0.0.25560.60.60.00.0.0.255
Currentpeer:20.20.20.20
Securityassociationlifetime:4608000kilobytes/190seconds
PFS(Y/N):N
Transformsets={MamaBear,PapaBear,BabyBear,}

ImplementationTipsforIPsec
ThesearesomeimplementationtipsforIPsec:
Makecertainthatyouhaveconnectivitybetweentheendpointsofthecommunicationbeforeyouconfigure
crypto.
MakesurethateitherDNSworksontherouter,oryouhaveenteredtheCAhostname,ifyouuseaCA.
IPsecusesIPprotocols50and51,andIKEtrafficpassesonprotocol17,port500(UDP500).Makesure
thesearepermittedappropriately.
BecarefulnottousethewordanyinyourACL.Thiscausesproblems.RefertotheUsageGuidelinesfor
accesslistinthePIXcommandreferenceformoreinformation.
Recommendedtransformcombinationsare:
espdesandespshahmac

ahshahmacandespdes

RememberthatAHisjustanauthenticatedheader.Theactualuserdatastreamisnotencrypted.Youneed
ESPfordatastreamencryption.IfyouuseonlyAHandseecleartextgoacrossthenetwork,donotbe
surprised.AlsouseESPifyouuseAH.NotethatESPcanalsoperformauthentication.Therefore,youcan
useatransformcombinationsuchasespdesandespshahmac.
ahrfc1828andesprfc1829areobsoletetransformsincludedforbackwardscompatibilitywitholderIPsec
implementations.Ifthepeerdoesnotsupportnewertransforms,trytheseinstead.
http://www.cisco.com/c/en/us/support/docs/securityvpn/ipsecnegotiationikeprotocols/16439IPSECpart8.html

24/26

12/9/2015

AnIntroductiontoIPSecurity(IPSec)EncryptionCisco

SHAisslowerandmoresecurethanMD5,whereasMD5isfasterandlesssecurethatSHA.Insome
communities,thecomfortlevelwithMD5isverylow.
Whenindoubt,usetunnelmode.Tunnelmodeisthedefaultanditcanbeusedintransportmode,aswellas
foritsVPNcapabilities.
ForclassiccryptouserswhoupgradetoCiscoIOSSoftwareRelease11.3,cryptocommandsstoragemethods
intheconfigurationhaschangedinordertoallowforIPsec.Consequently,ifclassiccryptouserseverrevertto
CiscoIOSSoftwareRelease11.2,theseusershavetoreentertheircryptoconfigurations.
Ifyoudoapingtestacrosstheencryptedlinkwhenyoufinishyourconfiguration,thenegotiationprocesscan
takesometime,aboutsixsecondsonaCisco4500,andabout20secondsonaCisco2500,becauseSAs
havenotyetbeennegotiated.Eventhougheverythingisconfiguredcorrectly,yourpingcaninitiallyfail.The
debugcryptoipsecanddebugcryptoisakmpcommandsshowyouwhathappens.Onceyourencrypted
datastreamshavefinishedtheirsetup,thepingworksfine.
Ifyourunintotroublewithyournegotiation(s)andmakeconfigurationchanges,usetheclearcryptoisand
clearcryptosacommandsinordertoflushthedatabasesbeforeyouretry.Thisforcesnegotiationtostart
anew,withoutanylegacynegotiationtogetintheway.Theclearcryptoisandclearcrysacommandsare
veryusefulinthismanner.

HelpandRelevantLinks
IPsecInformation
IPsecSupportPage
ECRAEncryptionPoliciesandProceduresSendanEmailtoexport@cisco.com

MoreSampleConfigurationsforIPsec
ConfiguringandTroubleshootingCisco'sNetworkLayerEncryption:IPSecandISAKMP
IPsecNetworkSecurityOverview
PIXFirewallIPsecconfigurationdocumentation
PIX5.1
PIX5.2
PIX5.3
PIX6.0
PIX6.1
PIX6.2
PIX6.3
ContacttheCiscoTechnicalSupportat(800)55324HR,(408)5267209,orsendandEmailtotac@cisco.comif
yourequirefurtherassistancewithIPsec.

References
Harkins,D.ISAKMP/OakleyProtocolFeatureSoftwareUnitFunctionalSpecification.ENG0000RevA.Cisco
Systems.
Madson,C.IPSecSoftwareUnitFunctionalSpecificationENG17610RevF.CiscoSystems.
Kaufman,C.PerlmanR.andSpencer,M.NetworkSecurity:PrivateCommunicationinaPublicWorld.Prentice
Hall,1995.
Schneier,B.AppliedCryptography:Protocols,Algorithms,andSourceCodeinC.SecondEd.JohnWiley&
http://www.cisco.com/c/en/us/support/docs/securityvpn/ipsecnegotiationikeprotocols/16439IPSECpart8.html

25/26

12/9/2015

AnIntroductiontoIPSecurity(IPSec)EncryptionCisco

Sons,Inc.
VariousIETFIPSecurityworkingdrafts

RelatedInformation
IPsecSupportPage
HowVirtualPrivateNetworksWork
MostCommonL2LandRemoteAccessIPSecVPNTroubleshootingSolutions
TechnicalSupport&DocumentationCiscoSystems

2015Ciscoand/oritsaffiliates.Allrightsreserved.

http://www.cisco.com/c/en/us/support/docs/securityvpn/ipsecnegotiationikeprotocols/16439IPSECpart8.html

26/26

S-ar putea să vă placă și