Troubleshooting GETVPN Deployments
Troubleshooting GETVPN Deployments
Session Objectives
Provide Overview of GETVPN
Deployment Considerations
Illustrate Troubleshooting Methodology and Techniques
Prerequisites
Knowledge of IP Routing
Knowledge of IPSec VPN Technologies
Basic Understanding of GETVPN is a Plus
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
Agenda
Introduction to GETVPN
Technology Overview
GETVPN Deployment
Configuration and Scalability
Troubleshooting
Common Show Commands, Debugs and Syslogs
Common Troubleshooting Scenarios
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
GETVPN Solution Overview
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
Cisco Group Encrypted Transport - GETVPN
What Is GETVPN?
Cisco GETVPN delivers a revolutionary solution for tunnel-less,
any-to-any and confidential branch communication
Large-scale any-to-any
encrypted communication
Any
Any--to
to --Any
Any Native routing without
Connectivity
Connectivity
tunnel overlay
Optimal for QoS and Multicast
support—improves application
Cisco GET
performance
VPN
Transport agnostic—private
Scalable Real Time LAN/WAN, FR/ATM, IP, MPLS
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
Tunnel-Less VPN—
A New Security Model
Any-to-Any Encryption: Before and After GET VPN
Before: IPSec P2P Tunnels After: Tunnel-Less VPN
WAN
Multicast
Internet
Edge
IPSec
GM GM
KS KS
WAN
Edge
Remote
Access
Internet/
Shared GET MPLS/Private
Encrypted Network
Network
EzVPN
Spoke
DMVPN DMVPN
Spoke Spoke GET GM GET GM GET GM
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
VPN Technology Positioning (Cont.)
Hub-Spoke and
Hub-Spoke; Any-to-Any;
Network Style Spoke-to-Spoke;
(Client to Site) (Site-to-Site)
(Site-to-Site)
Route Route
Failover Stateful Hub
Distribution Distribution
Redundancy Crypto Failover
Model Model + Stateful
Peer-to-Peer Peer-to-Peer
Encryption Style Group Protection
Protection Protection
Multicast
Multicast Multicast
IP Multicast replication in IP
replication at hub replication at hub
WAN network
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
Introduction to
GETVPN Technology
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
Group Encrypted Transport
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
Group Security Functions
Routing Member
Key Server Forwarding
Key Server Replication
Validate Group Members Routing
Manage Security Policy
Create Group Keys
Distribute Policy/Keys
Group
Member
Routing
Members
Group
Member
Group
Group Member Member
Encryption Devices
Route Between Secure/ Unsecure
Regions Group
Multicast Participation Member
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
Group Security Elements
KS Cooperative
Key Servers
Group Policy Protocol
Traffic Encryption
Key (TEK) Group
Member
Routing
Members
Group
Member
Group
Member
RFC3547:
Group Domain of
Interpretation Group
(GDOI) Member
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
Basic GET VPN Architecture
GM5
GM1
GM6
GM9 KS
GM8 GM7
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
Basic GET VPN Architecture
GM3
GM4
GM2
GM5
GM1
GM6
GM9 KS
GM8 GM7
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
Basic GET VPN Architecture
GM3
GM4
GM2
GM5
GM1
GM6
GM9 KS
GM8 GM7
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
Header Preservation
IPSec Tunnel Mode vs. GETVPN
IP Header IP Payload
IP Packet
IP Header IP Payload
IP Packet
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
GETVPN Data Path
Host2 GM 2 GM1 Host1
Encrypted
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
Rekey Methodology: Multicast Rekey
P1 P2
Core
P3
P4 replicates the
packet to all
S= 10. 1. 1. 1 the GMs
D= 192. 1. 1. 1
PE3
GM4
GM3
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
Rekey Methodology: Unicast Rekey
Key Server maintains state of active group members
Group Member sends ACK in response to the rekey
messages
Remove Group Member if the GM does not acknowledge
three rekeys
Key
Server
GM2
GM1
S =10. 1. 1. 1
D= 192. 1. 1. 1
PE1
S= 10. 1. 1. 1 S =10. 1.1. 1
D= 192. 1.1. 1 D = 192. 1. 1. 1
P1 P2
P3
P4
S= 10. 1. 1. 1
D= 192. 1. 1. 1
PE3
GM4
GM3
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
Requirement for Time-Based Anti-
Replay
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
Time-Based Anti-Replay
Anti-replay window
T0 T1 T20
0
Packet1
Packet2
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
Cooperative Key Servers—HA
Single KS is a single point of failure
Two or more KSs known as COOP KSs manage a common set of
keys and security policies for GETVPN group members
Group members can register to any one of the available KSs
Subnet 1
Subnet 2
GM 1
GM 2
IP Network
Subnet 3
Subnet 4
GM 4 GM 3
Cooperative KS3
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
Cooperative Key Servers—
Introduction (Cont.)
One KS is elected as the Primary KS
Cooperative KSs periodically exchange and synchronize group’s
database, policy and keys
Primary KS is responsible to generate and distribute group keys
Subnet 1
Subnet 2
GM 1
GM 2
IP Network
Subnet 4 Subnet 3
GM 4
GM 3
Announcement Messages
Rekey Messages
Cooperative KS3 (Secondary)
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
GETVPN Deployment Configuration
and Scalability
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
COOP Server Exportable RSA Keys
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
KS Configuration
crypto keyring gdoi1
Pre-shared Key pre-shared-key address 0.0.0.0 0.0.0.0 key nsite123
!
crypto isakmp policy 10
ISAKMP Policy
encr 3des
authentication pre-share
IPSec Transform !
crypto ipsec transform-set 3DES-SHA esp-3des
esp-sha-hmac
IPSec Profile
!
crypto ipsec profile gdoi1
Access-List used for set security-association lifetime seconds 7200
defining set transform-set 3DES-SHA
rekey (useful in !
multicast rekeys only) access-list 150 permit ip any host 225.1.1.1
!
Access-list denying access-list 160 deny eigrp any any
encryption for access-list 160 deny pim any any
ISAKMP/GDOI/EIGRP access-list 160 deny udp any any eq isakmp
packets and permitting access-list 160 deny udp any any eq 848
encryption for all IP traffic access-list 160 permit ip any any
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
KS Configuration (Cont.)
GDOI Group ID crypto gdoi group dgvpn1
Rekey Address mapping identity number 101
to ACL 150 (only for server local
multicast rekeys) ! rekey address ipv4 150 !
Lifetime for Key rekey lifetime seconds 14400
Encryption Key rekey retransmit 10 number 2
Rekey Retransmission rekey authentication mypubkey rsa dgvpn1
rekey transport unicast
RSA Key to authenticate sa ipsec 1
rekeys profile gdoi1
Unicast Rekey match address ipv4 160
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
GM Configuration
crypto keyring gdoi
Pre-Shared key pre-shared-key address 0.0.0.0 0.0.0.0 key nsite123
!
crypto isakmp policy 10
ISAKMP Policy encr 3des
authentication pre-share
group 2
!
crypto gdoi group dgvpn
GDOI Group identity number 101
server address ipv4 130.23.1.1
KS Address
!
!
GDOI configuration crypto map dgvpn 10 gdoi
mapped to crypto map set group dgvpn
!
Crypto map on interface FastEthernet0/0
the interface crypto map dgvpn
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
GETVPN Platform Support
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
Scalability and Performance
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
GETVPN Policy Considerations
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
Deployment Best Practices
IKE/IPSec
Use specific pre-shared keys for all the GMs and KSs instead of using default key
KS
Always use COOP KSs
Set the huge buffer to 65535 and add 10 buffers to permanent buffer list
Configure periodic DPDs between the COOP KSs
Enable GM authorization
Policy
Aggregate the permit access-list entries to reduce the entries
Enable Time-Based Anti-Replay
Avoid re-encrypting traffic which is already encrypted (SSH, HTTPS)
Registration
Distribute GM registration to multiple KSs by arranging the KS order in configuration
Rekey Timers
Set TEK lifetime to 7200 Seconds
Set KEK lifetime to 86400 Seconds
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32
Troubleshooting
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
Troubleshooting methodology overview
Assess
What’s going on
Ask the right questions to better define and clarify the problem
Acquire
What information do we need but we don’t have?
How to get the information
Analyze
Understand the flow
What’s supposed to happen vs. What actually happened
Act
Test assumptions
Deploy changes
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34
“A problem well stated is a problem half solved.”
Charles F. Kettering
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
Troubleshooting GETVPN
Ultimately all problems manifest at the data plane -
“my user application is not working over GETVPN!”
But where really is the problem?
Control Plane
GM registration issues
Policy download issues
COOP issues
Rekey failures
Data plane
Policy downloaded with SAs installed but traffic is not flowing
Which device is the culprit, encrypting or decrypting router?
In which direction is the problem happening, ingress or egress?
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
Control Plane Troubleshooting Tools
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37
Best practices when using the debug
commands
Turn off console logging
Use NTP to sync up times on all devices
Enable msec timestamping debug and log messages
service timestamps debug datetime msec
service timestamps log datetime msec
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38
Data Plane Troubleshooting Tools
Interface counters
Encryption/decryption counters
Netflow
IP Accounting
ACL
DSCP packet coloring
Embedded Packet Capture (EPC)
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39
GETVPN Control Plane Verification
Common Show Commands
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40
Show crypto gdoi (on KS)
Group Name : GET
Group Identity : 101
Group Members : 3
Registered GMs IPSec SA Direction : Both
Active Group Server : Local
coop configuration Redundancy : Configured
Local Address : 130.23.1.1
Local Priority : 10
Local KS Status : Alive
Key server role Local KS Role : Primary
Group Rekey Lifetime : 1800 secs
Group Rekey
KEK lifetime remaining Remaining Lifetime : 88 secs
Rekey Retransmit Period : 10 secs
Rekey Retransmit Attempts: 3
Group Retransmit
Remaining Lifetime : 0 secs
IPSec SA Number : 1
IPSec SA Rekey Lifetime: 900 secs
Profile Name : gdoi1
Replay method : Count Based
Replay Window Size : 64
SA Rekey
TEK lifetime remaining Remaining Lifetime : 446 secs
ACL Configured : access-list 160
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42
Show crypto gdoi KS member (on KS)
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43
Show crypto gdoi (on GM)
GROUP INFORMATION access-list deny ip any 224.0.0.0 0.255.255.255
Active access-list deny ip 224.0.0.0 0.255.255.255 any
Group Name : GET KS access-list deny ip any host 230.1.1.1
Group Identity : 101
Rekeys received : 270 KEK POLICY:
IPSec SA Direction : Both Rekey Transport Type : Unicast
Active Group Server : 134.50.0.1 Lifetime (secs) : 12295
Group Server list : 134.50.0.1 Encrypt Algorithm : 3DES
Key Size : 192
GM Reregisters in : 5187 secs Sig Hash Algorithm : HMAC_AUTH_SHA
Rekey Received(hh:mm:ss) : 00:02:30 Sig Key Length (bits) : 1024
Time Based
Anti Replay
Value
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44
Show crypto gdoi GM acl (on GM)
Group Name: GET
ACL downloaded ACL Downloaded From KS 130.2.1.1:
from KS access-list deny eigrp any any
access-list deny udp any any port = 500
access-list deny udp any any port = 848
Locally access-list permit ip any any
configured ACL ACL Configured Locally:
if present
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 45
Show crypto IPSec SA
PHEONIX-GM# sh crypto ipsec sa
interface: FastEthernet0/0
Crypto map tag: dgvpn, local addr 131.1.1.1
protected vrf: (none)
local ident (addr/mask/prot/port): (0.0.0.0/0.0.0.0/0/0)
remote ident (addr/mask/prot/port): (0.0.0.0/0.0.0.0/0/0)
current_peer port 848
<SNIP>
inbound esp sas:
spi: 0x1DA9D3E2(497669090)
transform: esp-3des esp-sha-hmac ,
<SNIP>
outbound esp sas:
spi: 0x1DA9D3E2(497669090)
transform: esp-3des esp-sha-hmac ,
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 47
GETVPN Verification
Common GM Syslog Messages
Registration:
CRYPTO-5-GM_REGSTER: Start registration to KS 10.1.11.2
for group G1 using address 10.1.13.2
GDOI-5-GM_REKEY_TRANS_2_UNI: Group G1 transitioned
to Unicast Rekey
GDOI-5-GM_REGS_COMPL: Registration to KS 10.1.11.2
complete for group G1 using address 10.1.13.2
Rekey:
GDOI-5-GM_RECV_REKEY: Received Rekey for group G1
from 10.1.11.2 to 10.1.13.2 with seq # 3
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 49
Syslog Messages Example (KS)
Rekey:
GDOI-5-KS_SEND_UNICAST_REKEY: Sending Unicast
Rekey for group G1 from address 101.1.1.1 with seq # 1
COOP:
GDOI-3-COOP_KS_UNREACH: Cooperative KS 10.0.9.1
Unreachable in group G1
GDOI-5-COOP_KS_ELECTION: KS entering election mode in
group G1 (Previous Primary = NONE)
GDOI-5-COOP_KS_TRANS_TO_PRI: KS 10.0.8.1 in group
G1 transitioned to Primary (Previous Primary = NONE)
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 50
Troubleshooting Methodology
crypto gdoi group G1 crypto gdoi group G1
identity number 3333 identity number 3333
server local server local
rekey lifetime seconds 86400 rekey lifetime seconds 86400
rekey authen mypubkey rsa get rekey authen mypubkey rsa get
rekey transport unicast rekey transport unicast
KS1 KS2
sa ipsec 1 sa ipsec 1
profile gdoi-p profile gdoi-p
match address ipv4 ENCPOL match address ipv4 ENCPOL
replay counter window-size 64 replay time window-size 5
address ipv4 10.1.11.2 Ser 1/0: 10.1.12.2 address ipv4 10.1.12.2
Ser 1/0: 10.1.11.2
redundancy redundancy
local priority 10 local priority 2
peer address ipv4 10.1.12.2
MPLS/Private IP peer address ipv4 10.1.11.2
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 52
GETVPN Common Issues – Control Plane
IKE Setup
Encryption Policy
Key Renewal—Rekey
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 53
COOP KS Setup and Election
IKE comes up as soon as COOP servers boot up
KS1# show crypto isakmp sa
IPv4 Crypto ISAKMP SA
dst src state conn-id slot status
10.1.11.2 10.1.12.2 GDOI_IDLE 1078 0 ACTIVE
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 54
COOP Configuration Mismatch
KS1: KS2:
crypto gdoi group G1 crypto gdoi group G1
server local server local
sa ipsec 1 sa ipsec 1
replay counter window-size 64 replay time window-size 5
IKE Setup
Encryption Policy
Key Renewal—Rekey
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 56
IKE Setup Between KS and GM
First step in GM registration is IKE setup
On successful negotiation of the IKE process, GM proceeds
with the GDOI group registration
IKE SA is established at the time of registration eventually
times out as its no longer needed after registration
Expires
after IKE
GM1#sh cry isa sa lifetime
IPv4 Crypto ISAKMP SA
dst src state conn-id slot status
10.1.11.2 10.1.20.2 GDOI_IDLE 1073 0 ACTIVE
10.1.20.2 10.1.11.2 GDOI_REKEY 1074 0 ACTIVE
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 57
IKE Setup—Pre-shared Key Mismatch
Symptoms
Possible causes:
Network issues between the GM and KS KS1 KS2
GM2
GM1
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 58
Pre-Shared Key Mismatch
Troubleshooting
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 59
Pre-Shared Key Mismatch
Solution
Mismatch!
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 60
GETVPN Common Issues – Control Plane
IKE Setup
Encryption Policy
Key Renewal—Rekey
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 61
GM Authorization and Registration
When the IKE session is successfully established, GM is
authorized (if configured) and GM registers with the KS
GM1#show crypto gdoi
GROUP INFORMATION
Group Name : G1
Group Identity : 3333
Rekeys received : 221
IPSec SA Direction : Both
Active Group Server : 10.1.11.2
<SNIP>
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 62
KS1 KS2
Unauthorized GM
Symptoms MPLS/Private IP
the KS
GM1#sh crypto isa sa
IPv4 Crypto ISAKMP SA
dst src state conn-id status
10.1.11.2 10.1.20.2 GDOI_IDLE 1054 ACTIVE
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 63
Unauthorized GM
Troubleshooting Steps
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 64
Unauthorized GM
Solution
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 65
GETVPN Common Issues – Control Plane
IKE Setup
Encryption Policy
Key Renewal—Rekey
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 66
GM Policy Download
As part of the registration process, KS pushes down the
encryption policies and keying material to the GM:
GM1#show cry gdoi
<SNIP>
ACL Downloaded From KS 10.1.11.2:
access-list deny eigrp any any
access-list deny ip 224.0.0.0 0.0.0.255 any
access-list deny ip any 224.0.0.0 0.0.0.255
access-list deny udp any port = 848 any port = 848
access-list permit ip any any
KEK POLICY:
Rekey Transport Type : Unicast
Lifetime (secs) : 2954
<SNIP>
TEK POLICY:
Serial1/0:
IPSec SA:
sa direction:inbound
spi: 0x2113F73B(554956603)
transform: esp-3des esp-sha-hmac
sa timing:remaining key lifetime (sec): (99)
Anti-Replay(Time Based) : 5 sec interval
<SNIP>
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 67
KS1 KS2
KS Policy Issues
Routing Control Plane Traffic Failure MPLS/Private IP
BGP
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 68
KS Policy Issues
Control Plane Traffic—Solution
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 69
KS Policy Issues
Data Plane Traffic Failure
MPLS/Private IP
GM1 GM2
Eth 0/0: 192.168.20.0/24 Eth 0/0: 192.168.21.0/24
KS Access-list
ip access-list extended ENCPOL
permit ip 192.168.20.0 0.0.0.255 192.168.21.0 0.0.0.255
permit ip 192.168.21.0 0.0.0.255 192.168.20.0 0.0.0.255
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 70
GETVPN Common Issues – Control Plane
IKE Setup
Encryption Policy
Key Renewal—Rekey
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 71
GETVPN Rekeys
Once the GETVPN network is properly setup and is
working, KS is responsible for sending out rekey
messages to all the GMs
KS can use unicast or multicast rekeys
Following syslog messages will appear in the log:
PRIMARY KS:
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 72
Missing RSA Key KS1 KS2
Symptoms
MPLS/Private IP
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 73
Missing RSA Key on the KS
Troubleshooting Steps
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 74
Missing RSA Key on the KS
Troubleshooting Steps (Cont.)
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 75
Missing RSA Key on the KS
Solution
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 76
Multicast Rekey Issues
Multicast Rekeys Failing - Symptom
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 77
KS1 KS2
GM1
GM2
Check KS to verify multicast rekey messages
are being sent
%GDOI-5-KS_SEND_MCAST_REKEY: Sending Multicast Rekey for group G1
from address 10.1.11.2 to 226.1.1.1 with seq # 6
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 78
Multicast Rekey Failing
Troubleshooting
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 79
Multicast Rekey Failing
Solution
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 80
Unicast Rekey Failing
Transient Network Issues
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 81
Unicast Rekey Failing
Troubleshooting and Solution
Verify whether the rekeys are not being sent, not
being received or not being processed
KS: GM:
show crypto gdoi ks members show crypto gdoi gm rekey
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 83
Rekey Fails Signature Validation
Solution
Problem:
Secondary KS has its own RSA key pair instead of the
exported key pair from the primary
To verify, compare the RSA key pairs KS1 KS2
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 84
GETVPN Common Issues
IKE Setup
Encryption Policy
Key Renewal—Rekey
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 85
Control Plane Replay Check Detection
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 86
Control Plane Replay Check
Code interoperability issue
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 87
Control Plane Replay Check
Code interoperability issue - solution
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 88
Control Plane Replay Check – IOS
Upgrade procedure
Recommended IOS releases
IOS: 12.4(15)T12
IOS-XE: 12.2(33)XND3
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 89
GETVPN Common Issues
IKE Setup
Encryption Policy
Key Renewal—Rekey
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 90
Control Plane Fragmentation Issues
COOP Announcement Packets
%SYS-2-GETBUF: Bad getbuffer, bytes= 18872 -Process= "Crypto IKMP", ipl= 0, pid= 183
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 91
GETVPN Data Plane
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 92
Generic IPSec Data Plane Troubleshooting
Need to have complete understanding of the forwarding
path and how to checkpoint it
Some syslogs may help reveal data plane drops
Data plane errors are typically rate limited
Common errors include replay, authentication failures
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 93
IPSec Data Plane Packet Flow Checkpoints
3 4
Traffic Direction 1 6
Private WAN
GM1 GM2
Client Server
2 5
Encrypting GM Decrypting GM
1. Ingress LAN interface 4. Ingress WAN interface
Input ACL Input ACL
Ingress Netflow Ingress Netflow
Embedded Packet Capture Embedded Packet Capture
2. Crypto engine Input IP precedence accounting
show crypto ipsec sa 5. Crypto engine
show crypto session detail show crypto ipsec sa
3. Egress WAN interface show crypto session detail
Egress Netflow 6. Egress WAN interface
Embedded Packet Capture Egress Netflow
Output IP precedence accounting Embedded Packet Capture
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 94
Encrypting GM Data Plane Flow
Verify clear traffic being received with Ingress Netflow
interface Ethernet0/0
ip address 192.168.13.1 255.255.255.0
ip flow ingress
!
GM1#sh ip cache flow
<snip>
SrcIf SrcIPaddress DstIf DstIPaddress Pr SrcP DstP Pkts
Et0/0 192.168.13.2 Se1/0 192.168.14.2 06 E443 0017 170
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 95
Encrypting GM Data Plane Flow – Cont.
Verify encrypted traffic existing GM with egress Netflow
interface Serial/0
ip address 10.1.13.2 255.255.255.252
ip flow egress
!
GM1#sh ip cache flow Protocol 50 = ESP
<snip>
SrcIf SrcIPaddress DstIf DstIPaddress Pr SrcP DstP Pkts
Et0/0 192.168.13.2 Se1/0* 192.168.14.2 32 EE5B 2BEF 170
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 96
Decrypting GM Data Plane Flow
Verify encrypted traffic arriving on GM with Netflow
Protocol 50 = ESP
GM2#sh ip cache flow
<snip>
SrcIf SrcIPaddress DstIf DstIPaddress Pr SrcP DstP Pkts
Se1/0 192.168.13.2 Et0/0 192.168.14.2 32 EE5B 2BEF 170
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 97
GETVPN Common Issues – Data Plane
Network/Path MTU
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 98
Fragmentation Issues
PMTU Discovery
GM1
MTU 1000 GM2
1400B 1460B
ICMP 3/4
Server sends a large packet with the DF bit set in an attempt to perform
network PMTUD
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 99
PMTUD and GETVPN
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 100
PMTUD and GETVPN
Solution
Implement ip tcp adjust-mss to reduce the TCP packet
segment size
Clear the DF bit in the encapsulating header User Traffic
Encrypting GM
DF=1 Data
interface Ethernet0/0
ip address 192.168.13.1 255.255.255.0
ip policy route-map clear-df-bit
!
route-map clear-df-bit permit 10
match ip address 111
set ip df 0
!
access-list 111 permit tcp any any
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 101
GETVPN Common Issues – Data Plane
Network/Path MTU
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 102
IPSec drop due to packet corruption
IPSec integrity check makes IPSec packets a lot
more sensitive to packet corruption in the network
Packet corruption symptoms
*Apr 6 20:57:09.171: %CRYPTO-4-RECVD_PKT_MAC_ERR: decrypt: mac verify
failed for connection id=695 local=192.168.14.2 remote=192.168.13.2
spi=7C4E759F seqno=00000001
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 104
BRKSEC-3011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 105