Sec Ike For Ipsec Vpns Xe 3s Book PDF
Sec Ike For Ipsec Vpns Xe 3s Book PDF
Sec Ike For Ipsec Vpns Xe 3s Book PDF
IOS XE Release 3S
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,
INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH
THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY,
CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version
of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS.
CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT
LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS
HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network
topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional
and coincidental.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: http://
www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership
relationship between Cisco and any other company. (1110R)
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
iii
Contents
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
iv
Contents
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
v
Contents
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
vi
Contents
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
vii
Contents
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
viii
Contents
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
ix
Contents
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
x
CHAPTER 1
Configuring Internet Key Exchange for IPsec
VPNs
This module describes how to configure the Internet Key Exchange (IKE) protocol for basic IP Security
(IPsec) Virtual Private Networks (VPNs). IKE is a key management protocol standard that is used in
conjunction with the IPsec standard. IPsec is an IP security feature that provides robust authentication and
encryption of IP packets.
IPsec can be configured without IKE, but IKE enhances IPsec by providing additional features, flexibility,
and ease of configuration for the IPsec standard.
IKE is a hybrid protocol, that implements the Oakley key exchange and Skeme key exchange inside the
Internet Security Association Key Management Protocol (ISAKMP) framework. (ISAKMP, Oakley, and
Skeme are security protocols implemented by IKE.)
Note Security threats, as well as the cryptographic technologies to help protect against them, are constantly
changing. For more information about the latest Cisco cryptographic recommendations, see the Next
Generation Encryption (NGE) white paper.
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
1
Configuring Internet Key Exchange for IPsec VPNs
Finding Feature Information
• Disable the crypto batch functionality, by using the no crypto batch allowed command to increase the
performance of a TCP flow on a Site-to-site VPN. However, disabling the crypto batch functionality
might have an impact on CPU utilization.
• Starting with Cisco IOS Release 15.0(1)SY and later, you cannot configure IPSec Network Security
features using crypto ipsec commands on Cisco Catalyst 6500 Series switches. For IPSec support on
these switches, you must use a hardware encryption engine.
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
2
Configuring Internet Key Exchange for IPsec VPNs
Information About Configuring IKE for IPsec VPNs
Note Cisco no longer recommends using DES, 3DES, MD5 (including HMAC variant), and Diffie-Hellman
(DH) groups 1, 2 and 5; instead, you should use AES, SHA-256 and DH Groups 14 or higher. For more
information about the latest Cisco cryptographic recommendations, see the Next Generation Encryption
(NGE) white paper.
The component technologies implemented for use by IKE include the following:
• AES—Advanced Encryption Standard. A cryptographic algorithm that protects sensitive, unclassified
information. AES is privacy transform for IPsec and IKE and has been developed to replace the Data
Encryption Standard (DES). AES is designed to be more secure than DES: AES offers a larger key size,
while ensuring that the only known approach to decrypt a message is for an intruder to try every possible
key. AES has a variable key length—the algorithm can specify a 128-bit key (the default), a 192-bit
key, or a 256-bit key.
• DES—Data Encryption Standard. An algorithm that is used to encrypt packet data. IKE implements the
56-bit DES-CBC with Explicit IV standard. Cipher Block Chaining (CBC) requires an initialization
vector (IV) to start encryption. The IV is explicitly given in the IPsec packet.
Cisco IOS software also implements Triple DES (168-bit) encryption, depending on the software versions
available for a specific platform. Triple DES (3DES) is a strong form of encryption that allows sensitive
information to be transmitted over untrusted networks. It enables customers, particularly in the finance industry,
to utilize network-layer encryption.
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
3
Configuring Internet Key Exchange for IPsec VPNs
IKE Benefits
Note Cisco IOS images that have strong encryption (including, but not limited to, 56-bit data encryption feature
sets) are subject to United States government export controls, and have a limited distribution. Images that
are to be installed outside the United States require an export license. Customer orders might be denied
or subject to delay because of United States government regulations. Contact your sales representative or
distributor for more information, or send e-mail to [email protected].
IKE interoperates with the X.509v3 certificates, which are used with the IKE protocol when authentication
requires public keys. This certificate support allows the protected network to scale by providing the equivalent
of a digital ID card to each device. When two devices intend to communicate, they exchange digital certificates
to prove their identity (thus removing the need to manually exchange public keys with each peer or to manually
specify a shared key at each peer).
IKE Benefits
IKE automatically negotiates IPsec security associations (SAs) and enables IPsec secure communications
without costly manual preconfiguration. Specifically, IKE provides the following benefits:
• Allows you to specify a lifetime for the IPsec SA.
• Allows encryption keys to change during IPsec sessions.
• Allows IPsec to provide antireplay services.
• Permits certification authority (CA) support for a manageable, scalable IPsec implementation.
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
4
Configuring Internet Key Exchange for IPsec VPNs
IKE Main Mode and Aggressive Mode
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
5
Configuring Internet Key Exchange for IPsec VPNs
IKE Authentication
Tip If you are interoperating with a device that supports only one of the values for a parameter, your choice
is limited to the value supported by the other device. Aside from this limitation, there is often a trade-off
between security and performance, and many of these parameter values represent such a trade-off. You
should evaluate the level of security risks for your network and your tolerance for these risks.
Note The parameter values apply to the IKE negotiations after the IKE SA is established. Depending on the
authentication method specified in a policy, additional configuration might be required (as described in
the section IKE Authentication, on page 6). If a peer’s policy does not have the required companion
configuration, the peer will not submit the policy when attempting to find a matching policy with the
remote peer.
IKE Authentication
IKE authentication consists of the following options and each authentication method requires additional
configuration.
RSA Signatures
With RSA signatures, you can configure the peers to obtain certificates from a CA. (The CA must be properly
configured to issue the certificates.) Using a CA can dramatically improve the manageability and scalability
of your IPsec network. Additionally, RSA signature-based authentication uses only two public key operations,
whereas RSA encryption uses four public key operations, making it costlier in terms of overall performance.
To properly configure CA support, see the module “Deploying RSA Keys Within a PKI.”
The certificates are used by each peer to exchange public keys securely. (RSA signatures requires that each
peer has the public signature key of the remote peer.) When both peers have valid certificates, they will
automatically exchange public keys with each other as part of any IKE negotiation in which RSA signatures
are used.
You can also exchange the public keys manually, as described in the section “Configuring RSA Keys Manually
for RSA Encrypted Nonces, on page 13.”
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
6
Configuring Internet Key Exchange for IPsec VPNs
IKE Authentication
RSA signatures provide nonrepudiation for the IKE negotiation. And, you can prove to a third party after the
fact that you did indeed have an IKE negotiation with the remote peer.
RSA encrypted nonces provide repudiation for the IKE negotiation; however, unlike RSA signatures, you
cannot prove to a third party that you had an IKE negotiation with the remote peer.
Preshared Keys
Note If RSA encryption is configured and signature mode is negotiated (and certificates are used for signature
mode), the peer will request both signature and encryption keys. Basically, the router will request as many
keys as the configuration will support. If RSA encryption is not configured, it will just request a signature
key.
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
7
Configuring Internet Key Exchange for IPsec VPNs
IKE Mode Configuration
identity of a remote peer is not recognized and a Domain Name System (DNS) lookup is unable to resolve
the identity.
Note Using 0.0.0.0 as a subnet address is not recommended because it encourages group preshared keys, which
allow all peers to have the same group key, thereby reducing the security of your user authentication.
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
8
Configuring Internet Key Exchange for IPsec VPNs
How to Configure IKE for IPsec VPNs
Note Security threats, as well as the cryptographic technologies to help protect against them, are constantly
changing. For more information about the latest Cisco cryptographic recommendations, see the Next
Generation Encryption (NGE) white paper.
Perform the following tasks to provide authentication of IPsec peers, negotiate IPsec SAs, and establish IPsec
keys:
SUMMARY STEPS
1. enable
2. configure terminal
3. crypto isakmp policy priority
4. encryption {des | 3des | aes | aes 192 | aes 256}
5. hash {sha | sha256 | sha384 | md5}
6. authentication {rsa-sig | rsa-encr | pre-share}
7. group {1 | 2 | 5 | 14 | 15 | 16 | 19 | 20 | 24}
8. lifetime seconds
9. exit
10. exit
11. show crypto isakmp policy
12. Repeat these steps for each policy you want to create.
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
9
Configuring Internet Key Exchange for IPsec VPNs
Creating IKE Policies
DETAILED STEPS
Example:
Router# configure terminal
Step 3 crypto isakmp policy priority Defines an IKE policy and enters config-isakmp configuration mode.
• priority —Uniquely identifies the IKE policy and assigns a priority to
Example: the policy. Valid values: 1 to 10,000; 1 is the highest priority.
Router(config)# crypto isakmp
policy 10
Step 4 encryption {des | 3des | aes | aes 192 | Specifies the encryption algorithm.
aes 256}
• By default, the des keyword is used.
Example: • des—56-bit DES-CBC (No longer recommended. AES is the
Router(config-isakmp)# encryption recommended encryption algorithm)
aes 256
• 3des—168-bit DES (No longer recommended. AES is the
recommended encryption algorithm)
• aes—128-bit AES
• aes 192—192-bit AES
• aes 256—256-bit AES
Step 5 hash {sha | sha256 | sha384 | md5} Specifies the hash algorithm.
• By default, SHA-1 (sha) is used.
Example:
Router(config-isakmp)# hash sha • The sha256 keyword specifies SHA-2 family 256-bit (HMAC variant)
as the hash algorithm.
• The sha384 keyword specifies SHA-2 family 384-bit (HMAC variant)
as the hash algorithm.
• The md5 keyword specifies MD5 (HMAC variant) as the hash algorithm.
(No longer recommended. SHA-256 is the recommended replacement.)
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
10
Configuring Internet Key Exchange for IPsec VPNs
Creating IKE Policies
The group chosen must be strong enough (have enough bits) to protect the
IPsec keys during negotiation. A generally accepted guideline recommends
the use of a 2048-bit group after 2013 (until 2030). Group 14 or higher (where
possible) can be selected to meet this guideline. Even if a longer-lived security
method is needed, the use of Elliptic Curve Cryptography is recommended,
but group 15 and group 16 can also be considered.
Example:
Router(config-isakmp)# exit
Example:
Router(config)# exit
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
11
Configuring Internet Key Exchange for IPsec VPNs
Creating IKE Policies
Example:
Router# show crypto isakmp policy
Examples
The following sample output from the show crypto isakmp policy command displays a warning message
after a user tries to configure an IKE encryption method that the hardware does not support:
Router# show crypto isakmp policy
Protection suite of priority 1
encryption algorithm: AES - Advanced Encryption Standard (256 bit keys).
WARNING:encryption hardware does not support the configured
encryption method for ISAKMP policy 1
hash algorithm: Secure Hash Standard 2 (256-bit)
authentication method: Pre-Shared Key
Diffie-Hellman group: #14 (2048 bit)
lifetime: 3600 seconds, no volume limit
Troubleshooting Tips
• Clear (and reinitialize) IPsec SAs by using the clear crypto sa EXEC command.
Using the clear crypto sa command without parameters will clear out the full SA database, which will clear
out active security sessions. You may also specify the peer, map, or entry keywords to clear out only a subset
of the SA database. For more information, see the clear crypto sa command in the Cisco IOS Security
Command Reference.
• The default policy and default values for configured policies do not show up in the configuration when
you issue the show running-config command. To display the default policy and any default values
within configured policies, use the show crypto isakmp policy command.
• Any IPsec transforms or IKE encryption methods that the current hardware does not support should be
disabled; they are ignored whenever an attempt to negotiate with the peer is made.
If a user enters an IPsec transform or an IKE encryption method that the hardware does not support, a warning
message will be generated. These warning messages are also generated at boot time. When an encrypted card
is inserted, the current configuration is scanned. If any IPsec transforms or IKE encryption methods are found
that are not supported by the hardware, a warning message will be generated.
What to Do Next
Depending on which authentication method you specified in your IKE policies (RSA signatures, RSA encrypted
nonces, or preshared keys), you must do certain additional configuration tasks before IKE and IPsec can
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
12
Configuring Internet Key Exchange for IPsec VPNs
Configuring IKE Authentication
successfully use the IKE policies. For information on completing these additional tasks, refer to the Configuring
IKE Authentication, on page 13.”
To configure an AES-based transform set, see the module “Configuring Security for VPNs with IPsec.”
Note Before configuring IKE authentication, you must have configured at least one IKE policy, which is where
the authentication method was specified (or RSA signatures was accepted by default).
To configure IKE authentication, you should perform one of the following tasks, as appropriate:
Prerequisites
You must have configured at least one IKE policy, which is where the authentication method was specified
(or RSA signatures was accepted by default).
To manually configure RSA keys, perform this task for each IPsec peer that uses RSA encrypted nonces in
an IKE policy.
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
13
Configuring Internet Key Exchange for IPsec VPNs
Configuring IKE Authentication
SUMMARY STEPS
1. enable
2. configure terminal
3. crypto key generate rsa{general-keys} | usage-keys} [label key-label] [exportable] [modulus
modulus-size]
4. crypto key generate ec keysize [256 | 384] [label label-string]
5. exit
6. show crypto key mypubkey rsa
7. configure terminal
8. crypto key pubkey-chain rsa
9. Do one of the following:
• named-key key-name [encryption | signature]
• addressed-key key-address [encryption | signature]
DETAILED STEPS
Example:
Router# configure terminal
Step 4 crypto key generate ec keysize [256 | 384] [label Generates EC keys.
label-string]
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
14
Configuring Internet Key Exchange for IPsec VPNs
Configuring IKE Authentication
Example:
Router(config)# exit
Step 6 show crypto key mypubkey rsa (Optional) Displays the generated RSA public keys.
Example:
Router# show crypto key mypubkey rsa
Example:
Router# configure terminal
Step 8 crypto key pubkey-chain rsa Enters public key chain configuration mode (so you can
manually specify the RSA public keys of other devices).
Example:
Router(config)# crypto key pubkey-chain rsa
Step 9 Do one of the following: Indicates which remote peer’s RSA public key you will
specify and enters public key configuration mode.
• named-key key-name [encryption | signature]
• If the remote peer uses its hostname as its ISAKMP
• addressed-key key-address [encryption |
identity, use the named-key command and specify the
signature]
remote peer’s FQDN, such as
somerouter.example.com, as the key-name.
Example:
Router(config-pubkey-chain)# addressed-key
10.1.1.2 encryption
Step 11 key-string key-string Specifies the RSA public key of the remote peer.
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
15
Configuring Internet Key Exchange for IPsec VPNs
Configuring IKE Authentication
Example:
Router(config-pubkey)# 00302017 4A7D385B
1234EF29 335FC973
Example:
Router(config-pubkey)# 2DD50A37 C4F4B0FD
9DADE748 429618D5
Example:
Router(config-pubkey)# 18242BA3 2EDFBDD3
4296142A DDF7D3D8
Example:
Router(config-pubkey)# 08407685 2F2190A0
0B43F1BD 9A8A26DB
Example:
Router(config-pubkey)# 07953829 791FCDE9
A98420F0 6A82045B
Example:
Router(config-pubkey)# 90288A26 DBC64468
7789F76E EE21
Example:
Router(config-pubkey-key)# quit
Step 13 Repeat these steps at each peer that uses RSA encrypted —
nonces in an IKE policy.
Step 14 exit Returns to global configuration mode.
Example:
Router(config-pubkey-key)# exit
Example:
Router(config)# exit
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
16
Configuring Internet Key Exchange for IPsec VPNs
Configuring IKE Authentication
Note Preshared keys do not scale well with a growing network. Mask preshared keys have the following
restrictions:
• The SA cannot be established between the IPsec peers until all IPsec peers are configured for the
same preshared key.
• The mask preshared key must be distinctly different for remote users requiring varying levels of
authorization. You must configure a new preshared key for each level of trust and assign the correct
keys to the correct parties. Otherwise, an untrusted party may obtain access to protected data.
SUMMARY STEPS
1. enable
2. configure terminal
3. crypto isakmp identity {address | dn | hostname}
4. ip host hostname address1 [address2...address8]
5. Do one of the following:
• crypto isakmp key keystring address peer-address [mask] [no-xauth]
• crypto isakmp key keystring hostname hostname [no-xauth]
7. Repeat these steps at each peer that uses preshared keys in an IKE policy.
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
17
Configuring Internet Key Exchange for IPsec VPNs
Configuring IKE Authentication
DETAILED STEPS
Example:
Router# configure terminal
Step 3 crypto isakmp identity {address | dn | Specifies the peer’s ISAKMP identity by IP address, by distinguished
hostname} name (DN) hostname at the local peer.
• address--Typically used when only one interface (and therefore
Example: only one IP address) will be used by the peer for IKE negotiations,
Router(config)# crypto isakmp identity
address and the IP address is known.
• dn--Typically used if the DN of a router certificate is to be
specified and chosen as the ISAKMP identity during IKE
processing. The dn keyword is used only for certificate-based
authentication.
• hostname--Should be used if more than one interface on the peer
might be used for IKE negotiations, or if the interface’s IP address
is unknown (such as with dynamically assigned IP addresses).
Step 4 ip host hostname address1 [address2...address8] If the local peer’s ISAKMP identity was specified using a hostname,
maps the peer’s host name to its IP address(es) at all the remote peers.
Example: (This step might be unnecessary if the hostname or address is already
Router(config)# ip host
RemoteRouter.example.com 192.168.0.1 mapped in a DNS server.)
Step 5 Do one of the following: Specifies at the local peer the shared key to be used with a particular
remote peer.
• crypto isakmp key keystring address
peer-address [mask] [no-xauth] • If the remote peer specified its ISAKMP identity with an address,
use the address keyword in this step; otherwise use the hostname
• crypto isakmp key keystring hostname
keyword in this step.
hostname [no-xauth]
• no-xauth--Prevents the router from prompting the peer for
Xauth information.
Example:
Router(config)# crypto isakmp key
sharedkeystring address 192.168.1.33 Note According to the design of preshared key authentication in
no-xauth IKE main mode, preshared keys must be based on the IP
address of the peers. Although you can send a hostname as
Example: the identity of a preshared key authentication, the key is
Router(config) crypto isakmp key searched on the IP address of the peer; if the key is not found
sharedkeystring hostname (based on the IP address) the negotiation will fail.
RemoteRouter.example.com
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
18
Configuring Internet Key Exchange for IPsec VPNs
Configuring IKE Mode Configuration
Example:
Router(config) crypto isakmp key
sharedkeystring address 10.0.0.1
Example:
Router(config) crypto isakmp key
sharedkeystring hostname
LocalRouter.example.com
SUMMARY STEPS
1. enable
2. configure terminal
3. ip local pool pool-name start-addr end-addr
4. crypto isakmp client configuration address-pool local pool-name
DETAILED STEPS
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
19
Configuring Internet Key Exchange for IPsec VPNs
Configuring an IKE Crypto Map for IPsec SA Negotiation
Example:
Router# configure terminal
Step 3 ip local pool pool-name start-addr end-addr Defines an existing local address pool that defines
a set of addresses.
Example:
Router(config)# ip local pool pool1 172.16.23.0
172.16.23.255
Step 4 crypto isakmp client configuration address-pool local References the local address pool in the IKE
pool-name configuration.
Example:
Router(config)# crypto isakmp client configuration
address-pool local pool1
Note Security threats, as well as the cryptographic technologies to help protect against them, are constantly
changing. For more information about the latest Cisco cryptographic recommendations, see the Next
Generation Encryption (NGE) white paper.
SUMMARY STEPS
1. enable
2. configure terminal
3. crypto map tag sequence ipsec-isakmp
4. set pfs {group1 | group2 | group5 | group14 | group15 | group16}
DETAILED STEPS
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
20
Configuring Internet Key Exchange for IPsec VPNs
Configuration Examples for an IKE Configuration
Example:
Router# configure terminal
Step 3 crypto map tag sequence Specifies the crypto map and enters crypto map configuration mode.
ipsec-isakmp
• The tag argument specifies the crypto map.
Example: • The sequence argument specifies the sequence to insert into the crypto
map entry.
Router(config)# crypto map example
1 ipsec-ipsec-isakmp • The ipsec-isakmp keyword specifies IPsec with IKEv1 (ISAKMP).
Step 4 set pfs {group1 | group2 | group5 | Specifies the DH group identifier for IPSec SA negotiation.
group14 | group15 | group16}
• By default, DH group 1 is used.
Example: • group1—768-bit DH (No longer recommended)
Router(config-isakmp)# set pfs 14 • group2—1024-bit DH (No longer recommended)
• group5—1536-bit DH (No longer recommended)
• group14—Specifies the 2048-bit DH group.
• group15—Specifies the 3072-bit DH group.
• group16—Specifies the 4096-bit DH group.
The group chosen must be strong enough (have enough bits) to protect the IPsec
keys during negotiation. A generally accepted guideline recommends the use
of a 2048-bit group after 2013 (until 2030). Either group 14 can be selected to
meet this guideline. Even if a longer-lived security method is needed, the use
of Elliptic Curve Cryptography is recommended, but group 15 and group 16
can also be considered.
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
21
Configuring Internet Key Exchange for IPsec VPNs
Example: Creating IKE Policies
Note Cisco no longer recommends using 3DES; instead, you should use AES. For more information about the
latest Cisco cryptographic recommendations, see the Next Generation Encryption (NGE) white paper.
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
22
Configuring Internet Key Exchange for IPsec VPNs
Example: Configuring IKE Authentication
!
hostname "Router1"
!
!
ip subnet-zero
!
!
no ip domain lookup
!
ip audit notify log
ip audit po max-events 100
!
crypto isakmp policy 10
encryption aes 256
authentication pre-share
lifetime 180
crypto isakmp key cisco123 address 10.0.110.1
!
!
crypto ipsec transform-set aesset esp-aes 256 esp-sha-hmac
mode transport
.
.
.
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
23
Configuring Internet Key Exchange for IPsec VPNs
Where to Go Next
Where to Go Next
After you have successfully configured IKE negotiation, you can begin configuring IPsec. For information
on completing these tasks, see the module “Configuring Security for VPNs With IPsec.”
Additional References
Related Documents
Configuring RSA keys to obtain certificates from a Deploying RSA Keys Within a PKI
CA
Suite-B Integrity algorithm type transform Configuring Internet Key Exchange Version 2 and
configuration. FlexVPN
Suite-B Elliptic curve Diffie-Hellman (ECDH) Configuring Internet Key Exchange Version 2 and
support for IPsec SA negotiation FlexVPN
Suite-B support for certificate enrollment for a PKI Configuring Certificate Enrollment for a PKI
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
24
Configuring Internet Key Exchange for IPsec VPNs
Feature Information for Configuring IKE for IPsec VPNs
Standards
Standards Title
None --
MIBs
RFCs
RFCs Title
RFC 2408 Internet Security Association and Key Management
Protocol (ISAKMP)
Technical Assistance
Description Link
The Cisco Support and Documentation website http://www.cisco.com/cisco/web/support/index.html
provides online resources to download documentation,
software, and tools. Use these resources to install and
configure the software and to troubleshoot and resolve
technical issues with Cisco products and technologies.
Access to most tools on the Cisco Support and
Documentation website requires a Cisco.com user ID
and password.
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
25
Configuring Internet Key Exchange for IPsec VPNs
Feature Information for Configuring IKE for IPsec VPNs
Use Cisco Feature Navigator to find information about platform support and Cisco software image support.
To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
Advanced Encryption Standard 12.2(8)T This feature adds support for the
(AES) new encryption standard AES,
which is a privacy transform for
IPsec and IKE and has been
developed to replace DES.
The following commands were
modified by this feature: crypto
ipsec transform-set, encryption
(IKE policy), show crypto ipsec
transform-set, crypto ipsec
transform-set, show crypto
isakmp policy.
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
26
Configuring Internet Key Exchange for IPsec VPNs
Feature Information for Configuring IKE for IPsec VPNs
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
27
Configuring Internet Key Exchange for IPsec VPNs
Feature Information for Configuring IKE for IPsec VPNs
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
28
CHAPTER 2
Call Admission Control for IKE
The Call Admission Control for IKE feature describes the application of Call Admission Control (CAC) to
the Internet Key Exchange (IKE) protocol in Cisco IOS software. CAC limits the number of simultaneous
IKE and IPsec security associations (SAs) that is, calls to CAC that a router can establish.
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
29
Call Admission Control for IKE
Information About Call Admission Control for IKE
IKE Session
There are two ways to limit the number of Internet Key Exchange (IKE) security associations (SAs) that a
device can establish to or from another device:
• Configure the absolute IKE SA limit by entering the crypto call admission limit command. The device
drops new IKE SA requests when the configured limit is reached.
• Configure the system resource limit by entering the call admission limit command. The device drops
new IKE SA requests when the level of system resources that are configured in the unit of charge is
being used.
Call Admission Control (CAC) is applied only to new SAs (that is, when an SA does not already exist between
peers). Every effort is made to preserve existing SAs. New SA requests are denied due to a lack of system
resources or because the configured IKE SA limit is reached.
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
30
Call Admission Control for IKE
System Resource Usage
SUMMARY STEPS
1. enable
2. configure terminal
3. crypto call admission limit {all in-negotiation-sa number | ipsec sa number | ike {in-negotiation-sa
number | sa number}}
4. exit
DETAILED STEPS
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
31
Call Admission Control for IKE
Configuring the System Resource Limit
Example:
Router# configure terminal
Step 3 crypto call admission limit {all in-negotiation-sa Specifies the maximum number of IKE SAs or total SAs in
number | ipsec sa number | ike {in-negotiation-sa negotiation or the maximum IKE SAs or IPsec SAs that can
number | sa number}} be established before IKE begins rejecting new SA requests.
The recommended CAC value for IKEv1 is 40.
Example:
Router(config)# crypto call admission limit
ike sa 25
SUMMARY STEPS
1. enable
2. configure terminal
3. call admission limit charge
4. exit
DETAILED STEPS
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
32
Call Admission Control for IKE
Verifying the Call Admission Control for IKE Configuration
Example:
Router# configure terminal
Step 3 call admission limit charge Sets the level of the system resources that, when used, causes
IKE to stop accepting new SA requests.
Example: • charge --Valid values are 1 to 100000.
Router(config)# call admission limit 1000
Step 4 exit Exits global configuration mode and returns to privileged EXEC
mode.
Example:
Router(config)# exit
SUMMARY STEPS
DETAILED STEPS
Example:
Router# show call admission statistics
Total Call admission charges: 82, limit 1000
Total calls rejected 1430, accepted 0
Load metric: charge 82, unscaled 82%
Example:
Router# show crypto call admission statistics
---------------------------------------------------------------------
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
33
Call Admission Control for IKE
Configuration Examples for Call Admission Control for IKE
Additional References
Related Documents
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
34
Call Admission Control for IKE
Feature Information for Call Admission Control for IKE
Standards
Standards Title
None --
MIBs
RFCs
RFCs Title
RFC 2409 The Internet Key Exchange
Technical Assistance
Description Link
The Cisco Support and Documentation website http://www.cisco.com/cisco/web/support/index.html
provides online resources to download documentation,
software, and tools. Use these resources to install and
configure the software and to troubleshoot and resolve
technical issues with Cisco products and technologies.
Access to most tools on the Cisco Support and
Documentation website requires a Cisco.com user ID
and password.
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
35
Call Admission Control for IKE
Feature Information for Call Admission Control for IKE
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
36
CHAPTER 3
Certificate to ISAKMP Profile Mapping
The Certificate to ISAKMP Profile Mapping feature enables you to assign an Internet Security Association
and Key Management Protocol (ISAKMP) profile to a peer on the basis of the contents of arbitrary fields
in the certificate. In addition, this feature allows you to assign a group name to those peers that are assigned
an ISAKMP profile.
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
37
Certificate to ISAKMP Profile Mapping
Restrictions for Certificate to ISAKMP Profile Mapping
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
38
Certificate to ISAKMP Profile Mapping
How Certificate to ISAKMP Profile Mapping Works
A certificate map can be attached to only one ISAKMP profile although an ISAKMP profile can have several
certificate maps attached to it.
Certificate maps provide the ability for a certificate to be matched with a given set of criteria. ISAKMP profiles
can bind themselves to certificate maps, and if the presented certificate matches the certificate map present
in an ISAKMP profile, the peer will be assigned the ISAKMP profile. If the ISAKMP profile contains a client
configuration group name, the same group name will be assigned to the peer. This ISAKMP profile information
will override the information in the ID_KEY_ID identity or in the first OU field of the certificate.
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
39
Certificate to ISAKMP Profile Mapping
How to Configure Certificate to ISAKMP Profile Mapping
SUMMARY STEPS
1. enable
2. configure terminal
3. crypto isakmp profile profile-name
4. match certificate certificate-map
DETAILED STEPS
Example:
Router# configure terminal
Step 3 crypto isakmp profile profile-name Defines an ISAKMP profile and enters into crypto
ISAKMP profile configuration mode.
Example:
Router (config)# crypto isakmp profile vpnprofile
Example:
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
40
Certificate to ISAKMP Profile Mapping
Verifying That the Certificate Has Been Mapped
SUMMARY STEPS
1. enable
2. show crypto ca certificates
DETAILED STEPS
Example:
Router# show crypto ca certificates
SUMMARY STEPS
1. enable
2. configure terminal
3. crypto isakmp profile profile-name
4. client configuration group group-name
DETAILED STEPS
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
41
Certificate to ISAKMP Profile Mapping
Monitoring and Maintaining Your Certificate to ISAKMP Profile Mapping
Example:
Router# configure terminal
Step 3 crypto isakmp profile profile-name Defines an ISAKMP profile and enters into isakmp profile
configuration mode.
Example:
Router (config)# crypto isakmp profile
vpnprofile
Step 4 client configuration group group-name Accepts the name of a group that will be assigned to a peer
when the peer is assigned this crypto ISAKMP profile.
Example:
Router (conf-isa-prof)# client configuration
group group1
SUMMARY STEPS
1. enable
2. debug crypto isakmp
DETAILED STEPS
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
42
Certificate to ISAKMP Profile Mapping
Configuration Examples for Certificate to ISAKMP Profile Mapping
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
43
Certificate to ISAKMP Profile Mapping
Mapping a Certificate to an ISAKMP Profile Verification Example
the certificate map has been configured, and debug command output showing that the certificate has gone
through certificate map matching and been matched to the ISAKMP profile.
Responder Configuration
Initiator Configuration
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
44
Certificate to ISAKMP Profile Mapping
Group Name Assigned to a Peer Verification Example
Initiator Configuration
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
45
Certificate to ISAKMP Profile Mapping
Additional References
Additional References
Related Documents
Standards
Standards Title
None --
MIBs
RFCs
RFC Title
None --
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
46
Certificate to ISAKMP Profile Mapping
Feature Information for Certificate to ISAKMP Profile Mapping
Technical Assistance
Description Link
The Cisco Support website provides extensive online http://www.cisco.com/cisco/web/support/index.html
resources, including documentation and tools for
troubleshooting and resolving technical issues with
Cisco products and technologies.
To receive security and technical information about
your products, you can subscribe to various services,
such as the Product Alert Tool (accessed from Field
Notices), the Cisco Technical Services Newsletter,
and Really Simple Syndication (RSS) Feeds.
Access to most tools on the Cisco Support website
requires a Cisco.com user ID and password.
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
47
Certificate to ISAKMP Profile Mapping
Feature Information for Certificate to ISAKMP Profile Mapping
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
48
CHAPTER 4
Encrypted Preshared Key
The Encrypted Preshared Key feature allows you to securely store plain text passwords in type 6 (encrypted)
format in NVRAM.
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
49
Encrypted Preshared Key
Information About Encrypted Preshared Key
“Can not encrypt password. Please configure a configuration-key with ‘key config-key’”
Changing a Password
If the password (master key) is changed, or reencrypted, using the key config-key
password-encryptioncommand), the list registry passes the old key and the new key to the application modules
that are using type 6 encryption.
Deleting a Password
If the master key that was configured using the key config-key password-encryptioncommand is deleted
from the system, a warning is printed (and a confirm prompt is issued) that states that all type 6 passwords
will become useless. As a security measure, after the passwords have been encrypted, they will never be
decrypted in the software. However, passwords can be reencrypted as explained in the previous paragraph.
Caution If the password configured using the key config-key password-encryptioncommand is lost, it cannot be
recovered. The password should be stored in a safe location.
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
50
Encrypted Preshared Key
Enabling the Encrypted Preshared Key
Storing Passwords
Because no one can “read” the password (configured using the key config-key password-encryptioncommand),
there is no way that the password can be retrieved from the router. Existing management stations cannot
“know” what it is unless the stations are enhanced to include this key somewhere, in which case the password
needs to be stored securely within the management system. If configurations are stored using TFTP, the
configurations are not standalone, meaning that they cannot be loaded onto a router. Before or after the
configurations are loaded onto a router, the password must be manually added (using the key config-key
password-encryptioncommand). The password can be manually added to the stored configuration but is not
recommended because adding the password manually allows anyone to decrypt all passwords in that
configuration.
SUMMARY STEPS
1. enable
2. configure terminal
3. key config-key password-encryption [text]
4. password encryption aes
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
51
Encrypted Preshared Key
Monitoring Encrypted Preshared Keys
DETAILED STEPS
Example:
Router# configure terminal
Step 3 key config-key password-encryption Stores a type 6 encryption key in private NVRAM.
[text]
• If you want to key in interactively (using the enter key) and an
encrypted key already exists, you will be prompted for the following:
Example: Old key, New key, and Confirm key.
Router (config)# key config-key
password-encryption • If you want to key in interactively but an encryption key is not
present, you will be prompted for the following: New key and
Confirm key.
• If you want to remove the password that is already encrypted, you
will see the following prompt: “WARNING: All type 6 encrypted
keys will become unusable. Continue with master key deletion?
[yes/no]:”.
Example:
Router (config)# password-encryption
aes
Troubleshooting Tips
If you see the warning message “ciphertext >[for username bar>] is incompatible with the configured master
key,” you have entered or cut and pasted cipher text that does not match the master key or there is no master
key. (The cipher text will be accepted or saved.) The warning message will allow you to locate the broken
configuration line or lines.
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
52
Encrypted Preshared Key
Monitoring Encrypted Preshared Keys
1 enable
2 password logging
SUMMARY STEPS
1. enable
2. password logging
DETAILED STEPS
Step 2 password logging Provides a log of debugging output for a type 6 password
operation.
Example:
Router# password logging
Examples
The following password logging debug output shows that a new master key has been configured and that the
keys have been encrypted with the new master key:
What To Do Next
You can perform any of the following procedures. Each procedure is independent of the others.
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
53
Encrypted Preshared Key
Configuring an ISAKMP Preshared Key
SUMMARY STEPS
1. enable
2. configure terminal
3. crypto isakmp key keystring address peer-address
4. crypto isakmp key keystring hostname hostname
DETAILED STEPS
Example:
Router# configure terminal
Step 3 crypto isakmp key keystring address peer-address Configures a preshared authentication key.
• The peer-address argument specifies the IP address
Example: of the remote peer.
Router (config)# crypto isakmp key cisco address
10.2.3.4
Step 4 crypto isakmp key keystring hostname hostname Configures a preshared authentication key.
• The hostname argument specifies the fully qualified
Example: domain name (FQDN) of the peer.
Router (config)# crypto isakmp key mykey
hostname mydomain.com
Example
The following sample output shows that an encrypted preshared key has been configured:
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
54
Encrypted Preshared Key
Configuring an ISAKMP Preshared Key in ISAKMP Keyrings
SUMMARY STEPS
1. enable
2. configure terminal
3. crypto keyring keyring-name
4. pre-shared-key address address key key
5. pre-shared-key hostname hostname key key
DETAILED STEPS
Example:
Router# configure terminal
Step 3 crypto keyring keyring-name Defines a crypto keyring to be used during Internet Key
Exchange (IKE) authentication and enters keyring
Example: configuration mode.
Step 4 pre-shared-key address address key key Defines a preshared key to be used for IKE authentication.
• The address argument specifies the IP address of the
Example: remote peer.
Router (config-keyring)# pre-shared-key address
10.2.3.5 key cisco
Step 5 pre-shared-key hostname hostname key key Defines a preshared key to be used for IKE authentication.
• The hostname argument specifies the FQDN of the
Example: peer.
Router (config-keyring)# pre-shared-key
hostname mydomain.com key cisco
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
55
Encrypted Preshared Key
Configuring ISAKMP Aggressive Mode
Example
The following show-running-config sample output shows that an encrypted preshared key in ISAKMP
keyrings has been configured.
SUMMARY STEPS
1. enable
2. configure terminal
3. crypto isakmp peer ip-address ip-address
4. set aggressive-mode client-endpoint client-endpoint
5. set aggressive-mode password password
DETAILED STEPS
Example:
Router# configure terminal
Step 3 crypto isakmp peer ip-address ip-address To enable an IP Security (IPSec) peer for IKE querying of
authentication, authorization, and accounting (AAA) for
Example: tunnel attributes in aggressive mode and to enter ISAKMP
peer configuration mode.
Router (config)# crypto isakmp peer ip-address
10.2.3.4
Step 4 set aggressive-mode client-endpoint client-endpoint Specifies the Tunnel-Client-Endpoint attribute within an
ISAKMP peer configuration.
Example:
Router (config-isakmp-peer)# set aggressive-mode
client-endpoint fqdn cisco.com
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
56
Encrypted Preshared Key
Configuring a Unity Server Group Policy
Example
The following show-running-config sample output shows that an encrypted preshared key in ISAKMP
aggressive mode has been configured.
SUMMARY STEPS
1. enable
2. configure terminal
3. crypto isakmp client configuration group group-name
4. pool name
5. domain name
6. key name
DETAILED STEPS
Example:
Router# configure terminal
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
57
Encrypted Preshared Key
Configuring an Easy VPN Client
Example:
Router (config)# crypto isakmp client
configuration group mygroup
Example:
Router (config-isakmp-group)# pool mypool
Step 5 domain name Specifies the Domain Name Service (DNS) domain to
which a group belongs.
Example:
Router (config-isakmp-group)# domain cisco.com
Step 6 key name Specifies the IKE preshared key for group policy attribute
definition.
Example:
Router (config-isakmp-group)# key cisco
Example
The following show-running-config sample output shows that an encrypted key has been configured for a
unity server group policy:
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
58
Encrypted Preshared Key
Configuring an Easy VPN Client
SUMMARY STEPS
1. enable
2. configure terminal
3. crypto ipsec client ezvpn name
4. peer ipaddress
5. mode client
6. group group-name key group-key
7. connect manual
DETAILED STEPS
Example:
Router# configure terminal
Step 3 crypto ipsec client ezvpn name Creates a Cisco Easy VPN remote configuration and enters Cisco
Easy VPN remote configuration mode.
Example:
Router (config)# crypto ipsec client ezvpn
myclient
Step 4 peer ipaddress Sets the peer IP address for the VPN connection.
Example:
Router (config-isakmp-peer)# peer 10.2.3.4
Step 5 mode client Automatically configures the router for Cisco Easy VPN Client
mode operation, which uses Network Address Translation (NAT)
Example: or Peer Address Translation (PAT) address translations.
Step 6 group group-name key group-key Specifies the group name and key value for the VPN connection.
Example:
Router (config-isakmp-ezvpn)# group mygroup
key cisco
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
59
Encrypted Preshared Key
Configuration Examples for Encrypted Preshared Key
Example
The following show-running-config sample output shows that an Easy VPN client has been configured. The
key has been encrypted.
New key:
Confirm key:
Router (config)#
01:46:40: TYPE6_PASS: New Master key configured, encrypting the keys with
the new master key
Router (config)# exit
Router # show running-config | include crypto isakmp key
crypto isakmp key 6 CXWdhVTZYB_Vcd^`cIHDOahiFTa address 10.0.0.2
Router (config)#
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
60
Encrypted Preshared Key
Key Already Exists Example
Router (config)#
Old key:
Router (config)#
Key Already Exists But the User Wants to Key In Interactively Example
In the following configuration example, the user wants to key in interactively, but a key already exists. The
Old key, New key, and Confirm key prompts will show on your screen if you enter the key config-key
command and press the enter key to get into interactive mode.
Router (config)#
Old key:
New key:
Confirm key:
Router (config)#
New key:
Confirm key:
Router (config)#
WARNING: All type 6 encrypted keys will become unusable. Continue with master key deletion
? [yes/no]: y
Where to Go Next
Configure any other preshared keys.
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
61
Encrypted Preshared Key
Additional References
Additional References
Related Documents
Related Topic Document Title
Configuring passwords Cisco IOS Security Command Reference
Standards
Standards Title
None --
MIBs
MIBs MIBs Link
None To locate and download MIBs for selected platforms,
Cisco IOS software releases, and feature sets, use
Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs
RFCs
RFCs Title
None --
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
62
Encrypted Preshared Key
Technical Assistance
Technical Assistance
Description Link
The Cisco Support and Documentation website http://www.cisco.com/cisco/web/support/index.html
provides online resources to download documentation,
software, and tools. Use these resources to install and
configure the software and to troubleshoot and resolve
technical issues with Cisco products and technologies.
Access to most tools on the Cisco Support and
Documentation website requires a Cisco.com user ID
and password.
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
63
Encrypted Preshared Key
Technical Assistance
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
64
CHAPTER 5
Distinguished Name Based Crypto Maps
Feature History
Release Modification
12.2(4)T This feature was introduced.
Note Security threats, as well as the cryptographic technologies to help protect against them, are constantly
changing. For more information about the latest Cisco cryptographic recommendations, see the Next
Generation Encryption (NGE) white paper.
This feature module describes the Distinguished Name Based Crypto Map feature in Cisco IOS Release
12.2(4)T. It includes the following sections:
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
65
Distinguished Name Based Crypto Maps
Feature Overview
Use Cisco Feature Navigator to find information about platform support and Cisco software image support.
To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
Feature Overview
The Distinguished Name Based Crypto Maps feature allows you to configure the router to restrict access to
selected encrypted interfaces for those peers with specific certificates, especially certificates with particular
Distinguished Names (DNs).
Previously, if the router accepted a certificate or a shared secret from the encrypting peer, Cisco IOS did not
have a method of preventing the peer from communicating with any encrypted interface other than the
restrictions on the IP address of the encrypting peer. This feature allows you to configure which crypto maps
are usable to a peer based on the DN that a peer used to authenticate itself, thereby, enabling you to control
which encrypted interfaces a peer with a specified DN can access.
Benefits
The Distinguished Name Based Crypto Maps feature allows you to set restrictions in the router configuration
that prevent peers with specific certificates--especially certificates with particular DNs-- from having access
to selected encrypted interfaces.
Restrictions
System Requirements
To configure this feature, your router must support IP Security.
Performance Impact
If you restrict access to a large number of DNs, it is recommended that you specify a few number of crypto
maps referring to large identity sections instead of specifying a large number of crypto maps referring to small
identity sections.
Related Documents
The following documents provide information related to the Distinguished Name Based Crypto Maps feature:
• Cisco IOS Security Command Reference
• Cisco IOS Security Configuration Guide: Secure Connectivity, Release 12.4T
• Next Generation Encryption (NGE) white paper.
Supported Platforms
This feature is supported on the following platforms:
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
66
Distinguished Name Based Crypto Maps
Supported Standards MIBs and RFCs
MIBs
None
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB
Locator found at the following URL:
http://www.cisco.com/go/mibs
RFCs
None
Prerequisites
Before configuring a DN based crypto map, you must perform the following tasks:
• Create an Internet Key Exchange (IKE) policy at each peer.
For more information on creating IKE policies, refer to the “ Configuring Internet Key Exchange for IPsec
VPNs ” chapter in the Cisco IOS Security Configuration Guide: Secure Connectivity ..
• Create crypto map entries for IPSec.
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
67
Distinguished Name Based Crypto Maps
Configuration Tasks
For more information on creating crypto map entries, refer to the “ Configuring Security for VPNs with IPsec
” chapter in the Cisco IOS Security Configuration Guide: Secure Connectivity
Configuration Tasks
See the following sections for configuration tasks for the Distinguished Name Based Crypto Maps feature.
Each task in the list is identified as either required or optional.
• Configuring DN Based Crypto Maps (authenticated by DN), on page 68 (required)
• Configuring DN Based Crypto Maps (authenticated by hostname), on page 68 (required)
• Applying Identity to DN Based Crypto Maps, on page 69 (required)
• Verifying DN Based Crypto Maps, on page 70 (optional)
SUMMARY STEPS
DETAILED STEPS
Step 2 Router(crypto-identity)# dn name=string Associates the identity of the router with the DN in the certificate of the
[,name=string] router.
Note The identity of the peer must match the identity in the exchanged
certificate.
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
68
Distinguished Name Based Crypto Maps
Applying Identity to DN Based Crypto Maps
SUMMARY STEPS
DETAILED STEPS
Step 2 Router(crypto-identity)# fqdn name Associates the identity of the router with the hostname that the peer used to
authenticate itself.
Note The identity of the peer must match the identity in the exchanged
certificate.
SUMMARY STEPS
DETAILED STEPS
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
69
Distinguished Name Based Crypto Maps
Verifying DN Based Crypto Maps
Command Purpose
Displays the configured identities.
Router# show crypto identity
Troubleshooting Tips
If an encrypting peer attempts to establish a connection that is blocked by the DN based crypto map
configuration, the following error message will be logged:
Configuration Examples
! DN based crypto maps require you to configure an IKE policy at each peer.
crypto isakmp policy 15
encryption aes
hash sha
authentication rsa-sig
group 14
lifetime 5000
crypto isakmp policy 20
encryption aes
hash sha
authentication pre-share
group 14
lifetime 10000
crypto isakmp key 1234567890 address 171.69.224.33
!
! The following is an IPSec crypto map (part of IPSec configuration). It can be used only
! by peers that have been authenticated by DN and if the certificate belongs to BigBiz.
crypto map map-to-bigbiz 10 ipsec-isakmp
set peer 172.21.114.196
set transform-set my-transformset
match address 124
identity to-bigbiz
!
crypto identity to-bigbiz
dn ou=BigBiz
!
!
! This crypto map can be used only by peers that have been authenticated by hostname
! and if the certificate belongs to little.com.
crypto map map-to-little-com 10 ipsec-isakmp
set peer 172.21.115.119
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
70
Distinguished Name Based Crypto Maps
DN Based Crypto Map Configuration Example
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
71
Distinguished Name Based Crypto Maps
DN Based Crypto Map Configuration Example
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
72
CHAPTER 6
IPsec and Quality of Service
The IPsec and Quality of Service feature allows Cisco IOS quality of service (QoS) policies to be applied
to IP Security (IPsec) packet flows on the basis of a QoS group that can be added to the current Internet
Security Association and Key Management Protocol (ISAKMP) profile.
Note Security threats, as well as the cryptographic technologies to help protect against them, are constantly
changing. For more information about the latest Cisco cryptographic recommendations, see the Next
Generation Encryption (NGE) white paper.
Finding Support Information for Platforms and Cisco IOS Software Images
Use Cisco Feature Navigator to find information about platform support and Cisco IOS software image
support. Access Cisco Feature Navigator at http://tools.cisco.com/ITDIT/CFN/jsp/index.jsp . You must have
an account on Cisco.com. If you do not have an account or have forgotten your username or password, click
Cancel at the login dialog box and follow the instructions that appear.
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
73
IPsec and Quality of Service
Prerequisites for IPsec and Quality of Service
find information about the features documented in this module, and to see a list of the releases in which each
feature is supported, see the feature information table at the end of this module.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support.
To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
74
IPsec and Quality of Service
How to Configure IPsec and Quality of Service
SUMMARY STEPS
1. enable
2. configure terminal
3. crypto isakmp-profile profile-number
4. qos-group group-number
DETAILED STEPS
Example:
Router# configure terminal
Step 3 crypto isakmp-profile profile-number Defines an ISAKMP profile, audits IPsec user sessions,
and enters ISAKMP profile configuration mode.
Example:
Router (config)# crypto isakmp-profile
vpnprofile
Example:
Router(config-isa-prof)# qos-group 1
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
75
IPsec and Quality of Service
Verifying IPsec and Quality of Service Sessions
SUMMARY STEPS
1. enable
2. show crypto isakmp profile
3. show crypto ipsec sa
DETAILED STEPS
Step 2 show crypto isakmp profile Shows that the QoS group is applied to the profile.
Example:
Router# show crypto isakmp profile
Step 3 show crypto ipsec sa Shows that the QoS group is applied to a particular pair of
IPsec security associations (SAs).
Example:
Router# show crypto ipsec sa
Troubleshooting Tips
If you have a problem with your IPsec and QoS sessions, ensure that you have done the following:
• Validated the application of QoS by the QoS service using the QoS-specific commands in the Cisco IOS
Quality of Service Solutions Command Reference.
• Configured a QoS policy on the router that matches the same QoS group as that specified for the class
map match criterion.
• Applied the service policy to the same interface to which a crypto map is applied.
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
76
IPsec and Quality of Service
Configuration Examples for IPsec and Quality of Service
version 12.3
!
aaa authentication login group group radius
aaa authorization network autho local
aaa accounting update periodic 1
aaa session-id common
ip subnet-zero
!
!
ip cef
no ip domain lookup
!
class-map match-all yellow
match qos-group 3
class-map match-all blue
match qos-group 2
!
!
policy-map clients
class blue
set precedence 5
class yellow
set precedence 7
!
!
crypto isakmp policy 1
encr aes
hash sha
authentication pre-share
group 14
lifetime 300
!
crypto isakmp keepalive 10 periodic
crypto isakmp xauth timeout 20
!
crypto isakmp client configuration group blue
key cisco
dns 10.2.2.2 10.2.2.3
wins 10.6.6.6
pool blue
save-password
include-local-lan
backup-gateway corky1.cisco.com
!
crypto isakmp client configuration group yellow
dns 10.2.2.2 10.2.2.3
wins 10.6.6.5
pool yellow
!
crypto isakmp profile blue
match identity group cisco
client authentication list autho
isakmp authorization list autho
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
77
IPsec and Quality of Service
show crypto isakmp profile Command Example
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
78
IPsec and Quality of Service
show crypto ipsec sa Command Example
Additional References
The following sections provide references related to the IPsec and Quality of Service feature.
Related Documents
Related Topic Document Title
IPsec Configuring Security for VPNs with IPsec
Standards
Standards Title
No new or modified standards are supported by this --
feature.
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
79
IPsec and Quality of Service
MIBs
MIBs
MIBs MIBs Link
No new or modified MIBs are supported by this To locate and download MIBs for selected platforms,
feature. Cisco IOS releases, and feature sets, use Cisco MIB
Locator found at the following URL:
http://www.cisco.com/go/mibs
RFCs
RFCs Title
No new or modified RFCs are supported by this --
feature.
Technical Assistance
Description Link
The Cisco Support website provides extensive online http://www.cisco.com/techsupport
resources, including documentation and tools for
troubleshooting and resolving technical issues with
Cisco products and technologies.
To receive security and technical information about
your products, you can subscribe to various services,
such as the Product Alert Tool (accessed from Field
Notices), the Cisco Technical Services Newsletter,
and Really Simple Syndication (RSS) Feeds.
Access to most tools on the Cisco Support website
requires a Cisco.com user ID and password.
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
80
IPsec and Quality of Service
Feature Information for IPsec and Quality of Service
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
81
IPsec and Quality of Service
Feature Information for IPsec and Quality of Service
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
82
CHAPTER 7
VRF-Aware IPsec
The VRF-Aware IPsec feature introduces IP Security (IPsec) tunnel mapping to Multiprotocol Label Switching
(MPLS) Virtual Private Networks (VPNs). Using the VRF-Aware IPsec feature, you can map IPsec tunnels
to Virtual Routing and Forwarding (VRF) instances using a single public-facing address.
Note Security threats, as well as the cryptographic technologies to help protect against them, are constantly
changing. For more information about the latest Cisco cryptographic recommendations, see the Next
Generation Encryption (NGE) white paper.
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
83
VRF-Aware IPsec
Restrictions for VRF-Aware IPsec
VRF Instance
A VRF instance is a per-VPN routing information repository that defines the VPN membership of a customer
site attached to the Provider Edge (PE) router. A VRF comprises an IP routing table, a derived Cisco Express
Forwarding (CEF) table, a set of interfaces that use the forwarding table, and a set of rules and routing protocol
parameters that control the information that is included in the routing table. A separate set of routing and
Cisco Express Forwarding (CEF) tables is maintained for each VPN customer.
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
84
VRF-Aware IPsec
VRF-Aware IPsec Functional Overview
on the VRF that is defined in the Internet Security Association and Key Management Protocol (ISAKMP)
profile that is attached to a crypto map entry.
The diagram below is an illustration of a scenario showing IPsec to MPLS and Layer 2 VPNs.
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
85
VRF-Aware IPsec
How to Configure VRF-Aware IPsec
SUMMARY STEPS
1. enable
2. configure terminal
3. crypto keyring keyring-name [vrf fvrf-name]
4. description string
5. pre-shared-key {address address [mask] | hostname hostname} key key
6. rsa-pubkey {address address | name fqdn} [encryption | signature]
7. address ip-address
8. serial-number serial-number
9. key-string
10. text
11. quit
12. exit
13. exit
DETAILED STEPS
Example:
Router# configure terminal
Step 3 crypto keyring keyring-name [vrf fvrf-name] Defines a keyring with keyring-name as the name of the keyring
and enters keyring configuration mode.
Example: • (Optional) The vrf keyword and fvrf-name argument
Router (config)# crypto keyring VPN1 imply that the keyring is bound to Front Door Virtual
Routing and Forwarding (FVRF). The key in the keyring
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
86
VRF-Aware IPsec
Configuring Crypto Keyrings
Example:
Example:
Router (config-keyring)# description The
keys for VPN1
Step 5 pre-shared-key {address address [mask] | (Optional) Defines a preshared key by address or host name.
hostname hostname} key key
Example:
Router (config-keyring)# pre-shared-key
address 10.72.23.11 key VPN1
Step 6 rsa-pubkey {address address | name fqdn} (Optional) Defines an RSA public key by address or host name
[encryption | signature] and enters rsa-pubkey configuration mode.
• The optional encryption keyword specifies that the key
Example: should be used for encryption.
Router(config-keyring)# rsa-pubkey name
host.vpn.com • The optional signature keyword specifies that the key
should be used for signature. By default, the key is used
for signature.
Step 7 address ip-address (Optional) Defines the RSA public key IP address.
Example:
Router(config-pubkey-key)# address 10.5.5.1
Step 8 serial-number serial-number (Optional) Specifies the serial number of the public key. The
value is from 0 through infinity.
Example:
Router(config-pubkey-key)# serial-number
1000000
Step 9 key-string Enters into the text mode in which you define the public key.
Example:
Router (config-pubkey-key)# key-string
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
87
VRF-Aware IPsec
Configuring ISAKMP Profiles
Example:
Router (config-pubkey)# quit
Example:
Router (config-pubkey)# exit
Example:
Router(config-keyring)# exit#
Note If traffic from the router to a certification authority (CA) (for authentication, enrollment, or for obtaining
a certificate revocation list [CRL]) or to an Lightweight Directory Access Protocol (LDAP) server (for
obtaining a CRL) needs to be routed via a VRF, the vrfcommand must be added to the trustpoint. Otherwise,
the traffic uses the default routing table.
• If a profile does not specify one or more trustpoints, all trustpoints in the router will be used to attempt
to validate the certificate of the peer (IKE main mode or signature authentication). If one or more
trustpoints are specified, only those trustpoints will be used.
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
88
VRF-Aware IPsec
Configuring ISAKMP Profiles
Note A router initiating IKE and a router responding to the IKE request should have symmetrical trustpoint
configurations. For example, a responding router (in IKE Main Mode) performing RSA signature encryption
and authentication might use trustpoints that were defined in the global configuration when sending the
CERT-REQ payloads. However, the router might use a restricted list of trustpoints that were defined in
the ISAKMP profile for the certificate verification. If the peer (the IKE initiator) is configured to use a
certificate whose trustpoint is in the global list of the responding router but not in ISAKMP profile of the
responding router, the certificate will be rejected. (However, if the initiating router does not know about
the trustpoints in the global configuration of the responding router, the certificate can still be authenticated.)
>
SUMMARY STEPS
1. enable
2. configure terminal
3. crypto isakmp profile profile-name
4. description string
5. vrf ivrf-name
6. keepalive seconds retry retry-seconds
7. self-identity {address | fqdn| user-fqdn user-fqdn}
8. keyring keyring-name
9. ca trust-point {trustpoint-name}
10. match identity {group group-name | address address [mask] [fvrf] | host host-name | host domain
domain-name | user user-fqdn | user domain domain-name}
11. client configuration address {initiate | respond}
12. client authentication list list-name
13. isakmp authorization list list-name
14. initiate mode aggressive
15. exit
DETAILED STEPS
Example:
Router# configure terminal
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
89
VRF-Aware IPsec
Configuring ISAKMP Profiles
Example:
Router (conf-isa-prof)# description
configuration for VPN profile
Step 5 vrf ivrf-name (Optional) Maps the IPsec tunnel to a Virtual Routing and Forwarding
(VRF) instance.
Example: Note The VRF also serves as a selector for matching the Security
Router (conf-isa-prof)# vrf VPN1 Policy Database (SPD). If the VRF is not specified in the
ISAKMP profile, the IVRF of the IPsec tunnel will be the same
as its FVRF.
Step 6 keepalive seconds retry retry-seconds (Optional) Allows the gateway to send dead peer detection (DPD)
messages to the peer.
Example: • If not defined, the gateway uses the global configured value.
Router (conf-isa-prof)# keepalive 60
retry 5 • seconds --Number of seconds between DPD messages. The range
is 10 to 3600 seconds.
• retry retry-seconds --Number of seconds between retries if the
DPD message fails. The range is 2 to 60 seconds.
Step 7 self-identity {address | fqdn| user-fqdn (Optional) Specifies the identity that the local Internet Key Exchange
user-fqdn} (IKE) should use to identify itself to the remote peer.
• If not defined, IKE uses the global configured value.
Example:
• address --Uses the IP address of the egress interface.
Router (conf-isa-prof)# self-identity
address • fqdn-- Uses the fully qualified domain name (FQDN) of the router.
• user-fqdn --Uses the specified value.
Step 8 keyring keyring-name (Optional) Specifies the keyring to use for Phase 1 authentication.
• If the keyring is not specified, the global key definitions are used.
Example:
Router (conf-isa-prof)# keyring VPN1
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
90
VRF-Aware IPsec
Configuring ISAKMP Profiles
Step 10 match identity {group group-name | address Specifies the client IKE Identity (ID) that is to be matched.
address [mask] [fvrf] | host host-name | host
domain domain-name | user user-fqdn | user • group group-name --Matches the group-name with the ID type
ID_KEY_ID. It also matches the group-name with the
domain domain-name}
Organizational Unit (OU) field of the Distinguished Name (DN).·
Example: • address address [mask] fvrf --Matches the address with the ID
type ID_IPV4_ADDR. The mask argument can be used to specify
Router (conf-isa-prof)# match identity
address 10.1.1.1 a range of addresses. The fvrf argument specifies that the address
is in Front Door Virtual Routing and Forwarding (FVRF)
• host hostname --Matches the hostname with the ID type
ID_FQDN.
• host domain domain-name --Matches the domain-name to the
ID type ID_FQDN whose domain name is the same as the
domain-name. Use this command to match all the hosts in the
domain.
• user username --Matches the username with the ID type
ID_USER_FQDN·
• user domain domainname --Matches the ID type
ID_USER_FQDN whose domain name matches the domainname.
Step 11 client configuration address {initiate | (Optional) Specifies whether to initiate the mode configuration exchange
respond} or responds to mode configuration requests.
Example:
Router (conf-isa-prof)# client
configuration address initiate
Step 12 client authentication list list-name (Optional) AAA (authentication, authorization, and accounting) to use
for authenticating the remote client during the extended authentication
Example: (XAUTH) exchange.
Step 13 isakmp authorization list list-name (Optional) Network authorization server for receiving the Phase 1
preshared key and other attribute-value (AV) pairs.
Example:
Router (conf-isa-prof)# isakmp
authorization list ikessaaalist
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
91
VRF-Aware IPsec
Configuring an ISAKMP Profile on a Crypto Map
Example:
Router (conf-isa-prof)# exit
What to Do Next
Go to the section Configuring an ISAKMP Profile on a Crypto Map, on page 92.”
SUMMARY STEPS
1. enable
2. configure terminal
3. crypto map map-name isakmp-profile isakmp-profile-name
4. set isakmp-profile profile-name
5. exit
DETAILED STEPS
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
92
VRF-Aware IPsec
Configuring to Ignore Extended Authentication During IKE Phase 1 Negotiation
Example:
Router# configure terminal
Step 3 crypto map map-name isakmp-profile (Optional) Specifies the Internet Key Exchange and Key
isakmp-profile-name Management Protocol (ISAKMP) profile for the crypto map
set and enters crypto map configuration mode.
Example: • The ISAKMP profile will be used during IKE exchange.
Router (config)# crypto map vpnmap
isakmp-profile vpnprofile
Step 4 set isakmp-profile profile-name (Optional) Specifies the ISAKMP profile to use when the
traffic matches the crypto map entry.
Example:
Router (config-crypto-map)# set isakmp-profile
vpnprofile
Example:
Router (config-crypto-map)# exit
SUMMARY STEPS
1. enable
2. configure terminal
3. no crypto xauth interface
DETAILED STEPS
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
93
VRF-Aware IPsec
Verifying VRF-Aware IPsec
Example:
Router# configure terminal
Step 3 no crypto xauth interface Ignores XAUTH proposals for requests that are destined to the
IP address of the interface. By default, Internet Key Exchange
Example: (IKE) processes XAUTH proposals.
SUMMARY STEPS
1. enable
2. show crypto ipsec sa [map map-name| address | identity | interface interface | peer [vrf fvrf-name]
address | vrf ivrf-name] [detail]
3. show crypto isakmp key
4. show crypto isakmp profile
5. show crypto key pubkey-chain rsa
DETAILED STEPS
Step 2 show crypto ipsec sa [map map-name| address | Allows you to view the settings used by current security
identity | interface interface | peer [vrf fvrf-name] associations (SAs).
address | vrf ivrf-name] [detail]
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
94
VRF-Aware IPsec
Clearing Security Associations
Example:
Router# show crypto ipsec sa vrf vpn1
Step 3 show crypto isakmp key Lists all the keyrings and their preshared keys.
• Use this command to verify your crypto keyring
Example: configuration.
Router# show crypto isakmp key
Step 4 show crypto isakmp profile Lists all ISAKMP profiles and their configurations.
Example:
Router# show crypto isakmp profile
Step 5 show crypto key pubkey-chain rsa Views the RSA public keys of the peer that are stored on
your router.
Example: • The output is extended to show the keyring to which
Router# show crypto key pubkey-chain rsa the public key belongs.
SUMMARY STEPS
1. enable
2. clear crypto sa [counters | map map-name | peer[vrf fvrf-name] address | spi address {ah | esp} spi |
vrf ivrf-name]
DETAILED STEPS
Step 2 clear crypto sa [counters | map map-name | peer[vrf fvrf-name] Clears the IPsec security associations (SAs).
address | spi address {ah | esp} spi | vrf ivrf-name]
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
95
VRF-Aware IPsec
Troubleshooting VRF-Aware IPsec
Example:
Router# clear crypto sa vrf VPN1
SUMMARY STEPS
1. enable
2. debug crypto ipsec
3. debug crypto isakmp
DETAILED STEPS
Example:
Router# debug crypto ipsec
Step 3 debug crypto isakmp Displays messages about Internet Key Exchange (IKE)
events.
Example:
Router(config)# debug crypto isakmp
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
96
VRF-Aware IPsec
Troubleshooting VRF-Aware IPsec
IPsec PE
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
97
VRF-Aware IPsec
Troubleshooting VRF-Aware IPsec
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
98
VRF-Aware IPsec
Troubleshooting VRF-Aware IPsec
500
04:32:55: ISAKMP (0:13): returning IP addr to the address pool
04:32:55: ISAKMP cookie gen for src 10.1.1.1 dst 172.16.1.1
04:32:55: ISAKMP cookie AA8F7B41 05D315C5
04:32:55: ISAKMP cookie gen for src 172.16.1.1 dst 10.1.1.1
04:32:55: ISAKMP cookie 3123100B 041A85A6
04:32:55: ISAKMP (0:13): SA has been authenticated with 10.1.1.1
04:32:55: ISAKMP: Trying to insert a peer 172.16.1.1/10.1.1.1/500/, and inserted
successfully.
04:32:55: ISAKMP: set new node -803402627 to CONF_XAUTH
04:32:55: IPSEC(key_engine): got a queue event...
04:32:55: ISAKMP (0:13): sending packet to 10.1.1.1 my_port 500 peer_port 500 (R) QM_IDLE
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
99
VRF-Aware IPsec
Troubleshooting VRF-Aware IPsec
request/reply exchange"
04:33:03: ISAKMP (0:13): Input = IKE_MESG_FROM_PEER, IKE_CFG_REPLY
04:33:03: ISAKMP (0:13): Old State = IKE_XAUTH_REQ_SENT New State =
IKE_XAUTH_AAA_CONT_LOGIN_AWAIT
04:33:03: ISAKMP cookie gen for src 10.1.1.1 dst 172.18.1.1
04:33:03: ISAKMP cookie AA8F7B41 A1B3E684
04:33:03: ISAKMP: isadb_post_process_list: crawler: B 27FF 12 (6482B354)
04:33:03: crawler my_cookie AA8F7B41 F7ACF384
04:33:03: crawler his_cookie E46E088D F227FE4D
04:33:03: ISAKMP: got callback 1
04:33:03: ISAKMP: set new node 524716665 to CONF_XAUTH
04:33:03: ISAKMP (0:13): initiating peer config to 10.1.1.1. ID = 524716665
04:33:03: ISAKMP (0:13): sending packet to 10.1.1.1 my_port 500 peer_port 500 (R) CONF_XAUTH
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
100
VRF-Aware IPsec
Troubleshooting VRF-Aware IPsec
04:33:03: ISAKMP (0:13): deleting node -1639992295 error FALSE reason ""
04:33:03: ISAKMP (0:13): Input = IKE_MESG_FROM_AAA, IKE_AAA_GROUP_ATTR
04:33:03: ISAKMP (0:13): Old State = IKE_CONFIG_AUTHOR_AAA_AWAIT New State = IKE_P1_COMPLETE
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
101
VRF-Aware IPsec
Troubleshooting VRF-Aware IPsec
{esp-aes esp-sha-hmac}
04:33:03: ISAKMP (0:13): IPSec policy invalidated proposal
04:33:03: ISAKMP (0:13): Checking IPSec proposal 2
04:33:03: ISAKMP: transform 1, ESP_AES
04:33:03: ISAKMP: attributes in transform:
04:33:03: ISAKMP: encaps is 1
04:33:03: ISAKMP: SA life type in seconds
04:33:03: ISAKMP: SA life duration (VPI) of 0x0 0x20 0xC4 0x9B
04:33:03: ISAKMP: SA life type in kilobytes
04:33:03: ISAKMP: SA life duration (VPI) of 0x0 0x46 0x50 0x0
04:33:03: ISAKMP: authenticator is HMAC-SHA
04:33:03: ISAKMP (0:13): atts are acceptable.
04:33:03: IPSEC(validate_proposal_request): proposal part #1,
(key eng. msg.) INBOUND local= 172.18.1.1, remote= 10.1.1.1,
local_proxy= 0.0.0.0/0.0.0.0/0/0 (type=4),
remote_proxy= 10.4.1.4/255.255.255.255/0/0 (type=1),
protocol= ESP, transform= esp-aes esp-sha-hmac,
lifedur= 0s and 0kb,
spi= 0x0(0), conn_id= 0, keysize= 0, flags= 0x2
04:33:03: IPSEC(kei_proxy): head = ra, map->ivrf = vpn1, kei->ivrf = vpn2
04:33:03: IPSEC(kei_proxy): head = ra, map->ivrf = vpn2, kei->ivrf = vpn2
04:33:03: ISAKMP (0:13): processing NONCE payload. message ID = 17011691
04:33:03: ISAKMP (0:13): processing ID payload. message ID = 17011691
04:33:03: ISAKMP (0:13): processing ID payload. message ID = 17011691
04:33:03: ISAKMP (0:13): asking for 1 spis from ipsec
04:33:03: ISAKMP (0:13): Node 17011691, Input = IKE_MESG_FROM_PEER, IKE_QM_EXCH
04:33:03: ISAKMP (0:13): Old State = IKE_QM_READY New State = IKE_QM_SPI_STARVE
04:33:03: IPSEC(key_engine): got a queue event...
04:33:03: IPSEC(spi_response): getting spi 2749516541 for SA
from 172.18.1.1 to 10.1.1.1 for prot 3
04:33:03: ISAKMP: received ke message (2/1)
04:33:04: ISAKMP (13): ID payload
next-payload : 5
type : 1
addr : 10.4.1.4
protocol : 0
port : 0
04:33:04: ISAKMP (13): ID payload
next-payload : 11
type : 4
addr : 0.0.0.0
protocol : 0
port : 0
04:33:04: ISAKMP (0:13): sending packet to 10.1.1.1 my_port 500 peer_port 500 (R) QM_IDLE
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
102
VRF-Aware IPsec
Configuration Examples for VRF-Aware IPsec
IPsec PE Configuration
ip vrf vpn1
rd 100:1
route-target export 100:1
route-target import 100:1
!
ip vrf vpn2
rd 101:1
route-target export 101:1
route-target import 101:1
!
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
103
VRF-Aware IPsec
Example Static IPsec-to-MPLS VPN
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
104
VRF-Aware IPsec
Example IPsec-to-MPLS VPN Using RSA Encryption
PE Router Configuration
ip vrf vpn1
rd 100:1
route-target export 100:1
route-target import 100:1
!
crypto isakmp policy 10
authentication rsa-encr
!
crypto keyring vpn1
rsa-pubkey address 172.16.1.1 encryption
key-string
305C300D 06092A86 4886F70D 01010105 00034B00 30480241 00DBF381 00DDECC8
DC4AA490 40320C52 9912D876 EB36717C 63DCA95C 7E5EC02A 84F276CE 292B42D7
D664F324 3726F4E0 39D33093 ECB81B95 482511A5 F064C4B3 D5020301 0001
quit
!
crypto isakmp profile vpn1
vrf vpn1
keyring vpn1
match identity address 172.16.1.1 255.255.255.255
!
crypto ipsec transform-set vpn1 esp-aes esp-sha-hmac
!
crypto map crypmap 1 ipsec-isakmp
set peer 172.16.1.1
set transform-set vpn1
set isakmp-profile vpn1
match address 101
!
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
105
VRF-Aware IPsec
Example IPsec-to-MPLS VPN with RSA Signatures
interface Ethernet1/1
ip address 172.17.1.1 255.255.0.0
tag-switching ip
!
interface Ethernet1/2
ip address 172.18.1.1 255.255.255.0
crypto map crypmap
!
ip route 172.16.1.1 255.255.255.255 172.18.1.2
ip route vrf vpn1 10.2.0.0 255.255.0.0 172.18.1.2 global
!
access-list 101 permit ip 10.1.0.0 0.0.255.255 10.2.0.0 0.0.255.255
PE Router Configuration
ip vrf vpn1
rd 100:1
route-target export 100:1
route-target import 100:1
!
crypto ca trustpoint bombo
enrollment url http://172.31.68.59:80
crl optional
!
crypto ca certificate chain bombo
certificate 03C0
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
106
VRF-Aware IPsec
Example IPsec-to-MPLS VPN with RSA Signatures
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
107
VRF-Aware IPsec
Example IPsec Remote Access-to-MPLS VPN
PE Router Configuration
aaa new-model
!
aaa group server radius vpn1
server-private 10.1.1.1 auth-port 1645 acct-port 1646 timeout 5 retransmit 3 key vpn1
!
aaa group server radius vpn2
server-private 10.1.1.1 auth-port 1645 acct-port 1646 timeout 5 retransmit 3 key vpn2
!
aaa authorization network aaa-list group radius
!
ip vrf vpn1
rd 100:1
route-target export 100:1
route-target import 100:1
!
ip vrf vpn2
rd 101:1
route-target export 101:1
route-target import 101:1
!
crypto isakmp profile vpn1-ra
vrf vpn1
match identity group vpn1-ra
client authentication list vpn1
isakmp authorization list aaa-list
client configuration address initiate
client configuration address respond
crypto isakmp profile vpn2-ra
vrf vpn2
match identity group vpn2-ra
client authentication list vpn2
isakmp authorization list aaa-list
client configuration address initiate
client configuration address respond
!
!
crypto ipsec transform-set vpn1 esp-aes esp-sha-hmac
crypto ipsec transform-set vpn2 esp-aes esp-sha-hmac
!
crypto dynamic-map vpn1 1
set transform-set vpn1
set isakmp-profile vpn1-ra
reverse-route
!
crypto dynamic-map vpn2 1
set transform-set vpn2
set isakmp-profile vpn2-ra
reverse-route
!
!
crypto map ra 1 ipsec-isakmp dynamic vpn1
crypto map ra 2 ipsec-isakmp dynamic vpn2
!
interface Ethernet1/1
ip address 172.17.1.1 255.255.0.0
tag-switching ip
!
interface Ethernet1/2
ip address 172.18.1.1 255.255.255.0
crypto map ra
!
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
108
VRF-Aware IPsec
Upgrade from Previous Versions of the Cisco Network-Based IPsec VPN Solution
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
109
VRF-Aware IPsec
Upgrade from Previous Versions of the Cisco Network-Based IPsec VPN Solution
Note You must change two keyrings. The VRF-Aware Upset feature requires that keys be associated with a
VRF if the IKE local endpoint is in the VRF.
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
110
VRF-Aware IPsec
Upgrade from Previous Versions of the Cisco Network-Based IPsec VPN Solution
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
111
VRF-Aware IPsec
Upgrade from Previous Versions of the Cisco Network-Based IPsec VPN Solution
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
112
VRF-Aware IPsec
Upgrade from Previous Versions of the Cisco Network-Based IPsec VPN Solution
!
interface FastEthernet0/0.2
encapsulation dot1Q 2 native
ip vrf forwarding VPN2
ip address 172.21.21.74 255.255.255.0
crypto map VPN2
Note For site-to-site configurations that do not require XAUTH, configure an ISAKMP profile without XAUTH
configuration. For remote access configurations that require XAUTH, configure an ISAKMP profile with
XAUTH.
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
113
VRF-Aware IPsec
Additional References
!
crypto map VPN1 10 ipsec-isakmp
set peer 172.21.25.74
set transform-set VPN1
set isakmp-profile VPN1
match address 101
crypto map VPN1 20 ipsec-isakmp dynamic VPN1-RA
!
crypto map VPN2 10 ipsec-isakmp
set peer 172.21.21.74
set transform-set VPN2
set isakmp-profile VPN2
match address 102
crypto map VPN2 20 ipsec-isakmp dynamic VPN2-RA
!
interface FastEthernet0/0.1
encapsulation dot1Q 1 native
ip vrf forwarding VPN1
ip address 172.21.25.73 255.255.255.0
crypto map VPN1
!
interface FastEthernet0/0.2
encapsulation dot1Q 2 native
ip vrf forwarding VPN2
ip address 172.21.21.74 255.255.255.0
crypto map VPN2
Additional References
Related Documents
IKE Phase 1 and Phase 2, aggressive mode, and main “Configuring Internet Key Exchange for IPsec VPNs”
mode
Standards
Standard Title
None --
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
114
VRF-Aware IPsec
Feature Information for VRF-Aware IPsec
MIBs
RFCs
RFC Title
None --
Technical Assistance
Description Link
The Cisco Support and Documentation website http://www.cisco.com/cisco/web/support/index.html
provides online resources to download documentation,
software, and tools. Use these resources to install and
configure the software and to troubleshoot and resolve
technical issues with Cisco products and technologies.
Access to most tools on the Cisco Support and
Documentation website requires a Cisco.com user ID
and password.
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
115
VRF-Aware IPsec
Feature Information for VRF-Aware IPsec
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
116
VRF-Aware IPsec
Glossary
Glossary
CA --certification authority. CA is an entity that issues digital certificates (especially X.509 certificates) and
vouches for the binding between the data items in a certificate.
CLI --command-line-interface. CLI is an interface that allows the user to interact with the operating system
by entering commands and optional arguments. The UNIX operating system and DOS provide CLIs.
client --Corresponding IPsec IOS peer of the UUT in the Multi Protocol Label Switching (MPLS) network.
dead peer --IKE peer that is no longer reachable.
DN --Distinguished Name. A DN is the global, authoritative name of an entry in the Open System
Interconnection (OSI Directory [X.500]).
FQDN --fully qualified domain name. A FQDN is the full name of a system rather than just its host name.
For example, aldebaran is a host name, and aldebaran.interop.com is an FQDN.
FR --Frame Relay. FR is an industry-standard, switch-data-link-layer protocol that handles multiple virtual
circuits using high-level data link (HDLC) encapsulation between connected devices. Frame Relay is more
efficient than X.25, the protocol for which it generally is considered a replacement.
FVRF --Front Door Virtual Routing and Forwarding (VRF) repository. FVRF is the VRF used to route the
encrypted packets to the peer.
IDB --Interface descriptor block. An IDB subblock is an area of memory that is private to an application. This
area stores private information and states variables that an application wants to associate with an IDB or an
interface. The application uses the IDB to register a pointer to its subblock, not to the contents of the subblock
itself.
IKE --Internet Key Exchange. IKE establishes a shared security policy and authenticates keys for services
(such as IPsec) that require keys. Before any IPsec traffic can be passed, each router, firewall, and host must
verify the identity of its peer. This can be done by manually entering preshared keys into both hosts or by a
CA service.
IKE keepalive --Bidirectional mechanism for determining the liveliness of an IKE peer.
IPsec --Security protocol for IP.
IVRF --Inside Virtual Routing and Forwarding. IVRF is the VRF of the plaintext packets.
MPLS --Multiprotocol Label Switching. MPLS is a switching method that forwards IP traffic using a label.
This label instructs the routers and the switches in the network where to forward the packets based on
preestablished IP routing information.
RSA --Rivest, Shamir, and Adelman are the inventors of the RSA technique. The RSA technique is a public-key
cryptographic system that can be used for encryption and authentication.
SA --Security Association. SA is an instance of security policy and keying material applied to a data flow.
VPN --Virtual Private Network. A VPN enables IP traffic to travel securely over a public TCP or IP network
by encrypting all traffic from one network to another. A VPN uses “tunneling” to encrypt all information at
the IP level.
VRF --Virtual Route Forwarding. VRF is A VPN routing and forwarding instance. A VRF consists of an IP
routing table, a derived forwarding table, a set of interfaces that use the forwarding table, and a set of rules
and routing protocols that determine what goes into the forwarding table. In general, a VRF includes the
routing information that defines a customer VPN site that is attached to a PE router.
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
117
VRF-Aware IPsec
Glossary
XAUTH --Extended authentication. XAUTH is an optional exchange between IKE Phase 1 and IKE Phase
2, in which the router demands additional authentication information in an attempt to authenticate the actual
user (as opposed to authenticating the peer).
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
118
CHAPTER 8
IKE Initiate Aggressive Mode
The IKE: Initiate Aggressive Mode feature allows you to specify RADIUS tunnel attributes for an IP security
(IPsec) peer and to initiate an Internet Key Exchange (IKE) aggressive mode negotiation with the tunnel
attributes. This feature is best implemented in a crypto hub-and-spoke scenario, by which the spokes initiate
IKE aggressive mode negotiation with the hub by using the preshared keys that are specified as tunnel
attributes and stored on the AAA server. This scenario is scalable because the preshared keys are kept at a
central repository (the AAA server) and more than one hub router and one application can use the information.
Note Security threats, as well as the cryptographic technologies to help protect against them, are constantly
changing. For more information about the latest Cisco cryptographic recommendations, see the Next
Generation Encryption (NGE) white paper.
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
119
IKE Initiate Aggressive Mode
Prerequisites for IKE Initiate Aggressive Mode
Tunnel-Client-Endpoint ID Types
Only the following ID types can be used in this feature:
• ID_IPV4 (IPV4 address)
• ID_FQDN (fully qualified domain name, for example “foo.cisco.com”)
• ID_USER_FQDN (e-mail address)
Overview
The IKE: Initiate Aggressive Mode feature allows you to configure IKE preshared keys as RADIUS tunnel
attributes for IPsec peers. Thus, you can scale your IKE preshared keys in a hub-and-spoke topology.
Although IKE preshared keys are simple to understand and easy to deploy, they do not scale well with an
increasing number of users and are therefore prone to security threats. Instead of keeping your preshared keys
on the hub router, this feature allows you to scale your preshared keys by storing and retrieving them from
an authentication, authorization, and accounting (AAA) server. The preshared keys are stored in the AAA
server as Internet Engineering Task Force (IETF) RADIUS tunnel attributes and are retrieved when a user
tries to “speak” to the hub router. The hub router retrieves the preshared key from the AAA server and the
spokes (the users) initiate aggressive mode to the hub by using the preshared key that is specified in the Internet
Security Association Key Management Policy (ISAKMP) peer policy as a RADIUS tunnel attribute.
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
120
IKE Initiate Aggressive Mode
RADIUS Tunnel Attributes
SUMMARY STEPS
1. enable
2. configure terminal
3. crypto map map-name isakmp authorization list list-name
4. crypto isakmp peer {ip-address ip-address | fqdn fqdn}
5. set aggressive-mode client-endpoint client-endpoint
6. set aggressive-mode password password
DETAILED STEPS
Example:
Router# configure terminal
Step 3 crypto map map-name isakmp authorization list Enables IKE querying of AAA for tunnel attributes in
list-name aggressive mode.
Example:
Router (config)# crypto map testmap10 isakmp
authorization list list ike
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
121
IKE Initiate Aggressive Mode
Verifying RADIUS Tunnel Attribute Configurations
Step 5 set aggressive-mode client-endpoint client-endpoint Specifies the Tunnel-Client-Endpoint attribute within
an ISAKMP peer configuration.
Example:
Router (config-isakmp)# set aggressive-mode
client-endpoint user-fqdn [email protected]
Step 6 set aggressive-mode password password Specifies the Tunnel-Password attribute within an
ISAKMP peer configuration.
Example:
Router (config-isakmp)#set aggressive-mode password
cisco123
Troubleshooting Tips
To troubleshoot the IKE: Initiate Aggressive Mode feature, perform the following steps.
SUMMARY STEPS
1. enable
2. debug aaa authorization
3. debug crypto isakmp
4. debug radius
DETAILED STEPS
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
122
IKE Initiate Aggressive Mode
Configuration Examples for IKE Initiate Aggressive Mode
Example:
Router# debug aaa authorization
Example:
Router# debug crypto isakmp
Example:
Router# debug radius
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
123
IKE Initiate Aggressive Mode
Spoke Configuration Example
!
interface FastEthernet0
ip address 10.4.4.1 255.255.255.0
crypto map Testtag
!
interface FastEthernet1
ip address 10.2.2.1 255.255.255.0
Additional References
The following sections provide references related to the IKE: Initiate Aggressive Mode feature.
Related Documents
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
124
IKE Initiate Aggressive Mode
Additional References
Standards
Standard Title
No new or modified standards are supported by this --
feature, and support for existing standards has not
been modified by this feature.
MIBs
RFCs
RFC Title
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
125
IKE Initiate Aggressive Mode
Feature Information for IKE Initiate Aggressive Mode
Technical Assistance
Description Link
The Cisco Support website provides extensive online http://www.cisco.com/techsupport
resources, including documentation and tools for
troubleshooting and resolving technical issues with
Cisco products and technologies.
To receive security and technical information about
your products, you can subscribe to various services,
such as the Product Alert Tool (accessed from Field
Notices), the Cisco Technical Services Newsletter,
and Really Simple Syndication (RSS) Feeds.
Access to most tools on the Cisco Support website
requires a Cisco.com user ID and password.
Internet Key Exchange for IPsec VPNs Configuration Guide, Cisco IOS XE Release 3S
126