Security For VPNs With IPsec Configuration Guide - 15.2MT
Security For VPNs With IPsec Configuration Guide - 15.2MT
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,
INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED
WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED
WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version
of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL
FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE
PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING,
WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR
ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL:
www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship
between Cisco and any other company. (1110R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output,
network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content
is unintentional and coincidental.
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
iii
Contents
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
iv
Contents
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
v
Contents
Example: VRF-Aware IPsec with Dynamic VTI When VRF is Configured Under a Virtual
Template with the Gateway Option in an IPsec Profile 92
Example: VRF-Aware IPsec with a Dynamic VTI When VRF is Configured Under an
ISAKMP Profile 93
Example: VRF-Aware IPsec with a Dynamic VTI When VRF is Configured Under an
ISAKMP Profile and a Gateway Option in an IPsec Profile 94
Example: VRF-Aware IPsec with a Dynamic VTI When a VRF is Configured Under Both
a Virtual Template and an ISAKMP Profile 94
Example: Configuring Multi-SA Support for Dynamic VTI Using IKEv2 95
Example: Dynamic Virtual Tunnel Interface with Virtual Firewall 97
Example: Dynamic Virtual Tunnel Interface with QoS 98
Example: Dynamic Virtual Tunnel Interface Using GRE with IPsec Protection 98
Additional References 99
Feature Information for IPsec Virtual Tunnel Interfaces 100
L2TP IPsec Support for NAT and PAT Windows Clients 103
Finding Feature Information 103
Prerequisites for L2TP IPsec Support for NAT and PAT Windows Clients 104
Restrictions for L2TP IPsec Support for NAT and PAT Windows Clients 104
Information About L2TP IPsec Support for NAT and PAT Windows Clients 104
How L2TP IPsec Support for NAT and PAT Windows Clients Works 104
How to Enable L2TP IPsec Support for NAT and PAT Windows Clients 106
Enabling L2TP IPsec Support 106
Configuration Examples for L2TP IPsec Support for NAT and PAT Windows Clients 108
Example: Dynamic Map Configuration 108
Additional References 110
Feature Information for L2TP IPsec Support for NAT and PAT Windows Clients 111
SafeNet IPsec VPN Client Support 113
Finding Feature Information 113
Prerequisites for SafeNet IPsec VPN Client Support 113
Restrictions for SafeNet IPsec VPN Client Support 114
Information About SafeNet IPsec VPN Client Support 114
ISAKMP Profile and ISAKMP Keyring Configurations Background 114
Local Termination Address or Interface 114
Benefit of SafeNet IPsec VPN Client Support 114
How to Configure SafeNet IPsec VPN Client Support 115
Limiting an ISAKMP Profile to a Local Termination Address or Interface 115
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
vi
Contents
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
vii
Contents
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
viii
Contents
Glossary 149
Option to Disable Hardware Crypto EngineFailover to Software Crypto Engine 151
Finding Feature Information 151
Prerequisites for Option to Disable Hardware Crypto Engine Failover to Software Crypto Engine 152
Information About Option to Disable Hardware Crypto Engine Failover to Software Crypto Engine 152
Hardware Crypto Engine Failover to the Software Crypto Engine Overview 152
Option to Disable Hardware Crypto Engine Failover 152
How to Configure Option to Disable Hardware Crypto Engine Failover to Software Crypto Engine 152
Disabling Hardware Crypto Engine Failover to the Software Crypto Engine 152
Configuration Examples for Option to Disable Hardware Crypto Engine Failover to Software
Crypto Engine 153
Disabled Hardware Crypto Engine Failover Example 153
Additional References 154
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
ix
Contents
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
x
Configuring Security for VPNs with IPsec
This module describes how to configure basic IPsec VPNs. IPsec is a framework of open standards
developed by the IETF. It provides security for the transmission of sensitive information over unprotected
networks such as the Internet. IPsec acts at the network layer, protecting and authenticating IP packets
between participating IPsec devices (“peers”), such as Cisco routers.
Note Security threats, as well as the cryptographic technologies to help protect against them, are constantly
changing. For more information about the latest Cisco cryptographic recommendations, see the Next
Generation Encryption (NGE) white paper.
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
1
Configuring Security for VPNs with IPsec
Restrictions for Configuring Security for VPNs with IPsec
Note If you decide not to use IKE, you must still disable it as described in the module Configuring Internet Key
Exchange for IPsec VPNs.
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
2
Supported Standards
Information About Configuring Security for VPNs with IPsec
• Cisco IOS Suite-B Support for IKE and IPsec Cryptographic Algorithms, page 16
• Crypto Map Sets, page 18
Supported Standards
Cisco implements the following standards with this feature:
• IPsec—IPsec is a framework of open standards that provides data confidentiality, data integrity, and
data authentication between participating peers. IPsec provides these security services at the IP layer;
IPsec uses IKE to handle negotiation of protocols and algorithms based on the local policy, and
generate the encryption and authentication keys to be used by IPsec. IPsec can be used to protect one
or more data flows between a pair of hosts, between a pair of security gateways, or between a security
gateway and a host.
Note The term IPsec is sometimes used to describe the entire protocol of IPsec data services
and IKE security protocols, and is also sometimes used to describe only the data services.
• IKE—A hybrid protocol that implements Oakley and SKEME key exchanges inside the Internet
Security Association and Key Management Protocol (ISAKMP) framework. While IKE is used with
other protocols, its initial implementation is with the IPsec protocol. IKE provides authentication of
IPsec peers, negotiates IPsec security associations, and establishes IPsec keys.
The component technologies implemented for IPsec include:
Note Cisco no longer recommends using DES, 3DES, MD5 (including HMAC variant), and Diffie-Hellman
(DH) groups 1, 2 and 5; instead, you should use AES, SHA and DH Groups 14 or higher. For more
information about the latest Cisco cryptographic recommendations, see the Next Generation Encryption
(NGE) white paper.
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
3
Supported Hardware Switching Paths and Encapsulation
Supported Hardware
Note Cisco IOS images with strong encryption (including, but not limited to 56-bit data encryption feature sets)
are subject to United States government export controls, and have a limited distribution. Images to be
installed outside the United States require an export license. Customer orders might be denied or subject to
delay due to United States government regulations. Contact your sales representative or distributor for more
information, or send an e-mail to [email protected].
Supported Hardware
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
4
Configuring Security for VPNs with IPsec
AIMs and NM Support
and extranet applications. It also provides platform scalability and security while working with all services
necessary for successful VPN deployments—security, quality of service (QoS), firewall and intrusion
detection, service-level validation, and management. The VAM off-loads IPsec processing from the main
processor, thus freeing resources on the processor engines for other tasks.
The VAM provides hardware-accelerated support for the following multiple encryption functions:
• 56-bit DES standard mode: CBC
• 3-Key Triple DES (168-bit)
• SHA-1 and MD5
• Rivest, Shamir, Adleman (RSA) public-key algorithm
• Diffie-Hellman key exchange RC4-40
For more information on VAMs, see the document VPN Acceleration Module (VAM).
IPPCP Software for Use with AIMs and NMs in Cisco 2600 and Cisco 3600 Series Routers
The software Internet Protocol Payload Compression Protocol (IPPCP) with AIMs and NMs allows
customers to use Lempel-Ziv-Stac (LZS) software compression with IPsec when a VPN module is in Cisco
2600 and Cisco 3600 series routers, allowing users to effectively increase the bandwidth on their interfaces.
Without IPPCP software, compression is not supported with the VPN encryption hardware AIM and NM;
that is, a user has to remove the VPN module from the router and run the software encryption with software
compression. IPPCP enables all VPN modules to support LZS compression in the software when the VPN
module is in the router, thereby allowing users to configure data compression and increase their bandwidth,
which is useful for a low data link.
Without IPPCP, compression occurs at Layer 2, and encryption occurs at Layer 3. After a data stream is
encrypted, it is passed on for compression services. When the compression engine receives the encrypted
data streams, the data expands and does not compress. This feature enables both compression and
encryption of the data to occur at Layer 3 by selecting LZS with the IPsec transform set; that is, LZS
compression occurs before encryption, and with better compression ratio.
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
5
Configuring Security for VPNs with IPsec
Supported Switching Paths
For more information on AIMs and NM, see the Installing Advanced Integration Modules in Cisco 2600
Series, Cisco 3600 Series, and Cisco 3700 Series Routers document.
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
6
IPsec Functionality Overview
Supported Encapsulation
Supported Encapsulation
IPsec works with the following serial encapsulations: Frame Relay, High-Level Data-Links Control
(HDLC), and PPP.
IPsec also works with Generic Routing Encapsulation (GRE) and IPinIP Layer 3, Layer 2 Forwarding
(L2F), Layer 2 Tunneling Protocol (L2TP), Data Link Switching+ (DLSw+), and Source Route Bridging
(SRB) tunneling protocols; however, multipoint tunnels are not supported. Other Layer 3 tunneling
protocols may not be supported for use with IPsec.
Because the IPsec Working Group has not yet addressed the issue of group key distribution, IPsec currently
cannot be used to protect group traffic (such as broadcast or multicast traffic).
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
7
Configuring Security for VPNs with IPsec
Supported Encapsulation
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
8
Configuring Security for VPNs with IPsec
IKEv1 Transform Sets
The transforms shown above translate to the following combinations in the following order of priority:
aes-cbc-128, sha, 5
aes-cbc-128, sha, 2
aes-cbc-128, md5, 5
aes-cbc-128, md5, 2
3des, sha1, 5
3des, sha1, 2
3des, md5, 5
3des, md5, 2
Although the crypto ikev2 proposal command is similar to the crypto isakmp policy priority command,
the IKEv2 proposal differs as follows:
• An IKEv2 proposal allows configuration of one or more transforms for each transform type.
• An IKEv2 proposal does not have any associated priority.
Note To use IKEv2 proposals in negotiation, they must be attached to IKEv2 policies. If a proposal is not
configured, then the default IKEv2 proposal is used with the default IKEv2 policy.
When multiple transforms are configured for a transform type, the order of priority is from left to right.
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
9
IPsec Traffic Nested to Multiple Peers
IKEv2 Transform Sets
A proposal with multiple transforms for each transform type translates to all possible combinations of
transforms. If only a subset of these combinations is required, then they must be configured as individual
proposals.
aes-cbc-128, sha1, 14
aes-cbc-192, sha1, 14
aes-cbc-128, sha256, 14
aes-cbc-192, sha256, 14
To configure the first and last transform combinations, use the following commands:
It is possible for the traffic between the “outer” peers to have one kind of protection (such as data
authentication) and for traffic between the “inner” peers to have a different protection (such as both data
authentication and encryption).
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
10
Configuring Security for VPNs with IPsec
Crypto Access List Overview
• When to Use the permit and deny Keywords in Crypto Access Lists, page 11
• Mirror Image Crypto Access Lists at Each IPsec Peer, page 13
• When to Use the any Keyword in Crypto Access Lists, page 14
When to Use the permit and deny Keywords in Crypto Access Lists
Crypto protection can be permitted or denied for certain IP traffic in a crypto access list as follows:
• To protect IP traffic that matches the specified policy conditions in its corresponding crypto map entry,
use the permit keyword in an access list.
• To refuse protection for IP traffic that matches the specified policy conditions in its corresponding
crypto map entry, use the deny keyword in an access list.
Note IP traffic is not protected by crypto if it is refused protection in all of the crypto map entries for an
interface.
After the corresponding crypto map entry is defined and the crypto map set is applied to the interface, the
defined crypto access list is applied to the interface. Different access lists must be used in different entries
of the same crypto map set. However, both inbound and outbound traffic is evaluated against the same
“outbound” IPsec access list. Therefore, the access list criteria is applied in the forward direction to traffic
exiting your router and in the reverse direction to traffic entering your router.
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
11
Configuring Security for VPNs with IPsec
When to Use the permit and deny Keywords in Crypto Access Lists
In the figure below, IPsec protection is applied to traffic between Host 10.0.0.1 and Host 192.168.0.2 as the
data exits Router A’s S0 interface en route to Host 192.168.0.2. For traffic from Host 10.0.0.1 to Host
192.168.0.2, the access list entry on Router A is evaluated as follows:
source = host 10.0.0.1
dest = host 192.168.0.2
For traffic from Host 192.168.0.2 to Host 10.0.0.1, the access list entry on Router A is evaluated as follows:
source = host 192.168.0.2
dest = host 10.0.0.1
Figure 2 How Crypto Access Lists Are Applied for Processing IPsec
If you configure multiple statements for a given crypto access list that is used for IPsec, in general the first
permit statement that is matched is the statement used to determine the scope of the IPsec SA. That is, the
IPsec SA is set up to protect traffic that meets the criteria of the matched statement only. Later, if traffic
matches a different permit statement of the crypto access list, a new, separate IPsec SA is negotiated to
protect traffic matching the newly matched access list statement.
Any unprotected inbound traffic that matches a permit entry in the crypto access list for a crypto map entry
flagged as IPsec is dropped because this traffic was expected to be protected by IPsec.
Note If you view your router’s access lists by using a command such as show ip access-lists, all extended IP
access lists are shown in the command output. This display output includes extended IP access lists that are
used for traffic filtering purposes and those that are used for crypto. The show command output does not
differentiate between the different uses of the extended access lists.
The following example shows that if overlapping networks are used, then the most specific networks are
defined in crypto sequence numbers before less specific networks are defined. In this example, the more
specific network is covered by the crypto map sequence number 10, followed by the less specific network
in the crypto map, which is sequence number 20.
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
12
Configuring Security for VPNs with IPsec
Mirror Image Crypto Access Lists at Each IPsec Peer
Figure 3 Mirror Image vs. Nonmirror Image Crypto Access Lists (for IPsec)
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
13
Transform Sets: A Combination of Security Protocols and Algorithms
When to Use the any Keyword in Crypto Access Lists
As the above figure indicates, IPsec SAs can be established as expected whenever the two peers’ crypto
access lists are mirror images of each other. However, an IPsec SA can be established only some of the
time when access lists are not mirror images of each other. This can happen in the case where an entry in
one peer’s access list is a subset of an entry in the other peer’s access list, such as shown in Cases 3 and 4
in the above figure. IPsec SA establishment is critical to IPsec—without SAs, IPsec does not work, thus
causing packets matching the crypto access list criteria to be silently dropped instead of being forwarded
with IPsec.
In the figure above, an SA cannot be established in Case 4. This is because SAs are always requested
according to the crypto access lists at the initiating packet’s end. In Case 4, Router N requests that all traffic
between Subnet X and Subnet Y be protected, but this is a superset of the specific flows permitted by the
crypto access list at Router M, so the request is not permitted. Case 3 works because Router M’s request is
a subset of the specific flows permitted by the crypto access list at Router N.
Because of the complexities introduced when crypto access lists are not configured as mirror images at peer
IPsec devices, Cisco strongly encourages you to use mirror image crypto access lists.
Note In Cisco IOS Release 12.4(9)T and later releases, multicast traffic from the router will be encapsulated into
IPsec if proxy identities allow encapsulation.
The permit any any statement is strongly discouraged because this causes all outbound traffic to be
protected (and all protected traffic is sent to the peer specified in the corresponding crypto map entry) and
requires protection for all inbound traffic. Then, all inbound packets that lack IPsec protection are silently
dropped, including packets for routing protocols, the Network Time Protocol (NTP), echo, echo response,
and so on.
You need to be sure that you define which packets to protect. If you must use the any keyword in a permit
statement, you must preface that statement with a series of deny statements to filter out any traffic (that
would otherwise fall within that permit statement) that you do not want to be protected.
The use of the any keyword in access control lists (ACLs) with reverse route injection (RRI) is not
supported. (For more information on RRI, see the section “Creating Crypto Map Sets, page 30.”)
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
14
Configuring Security for VPNs with IPsec
About Transform Sets
Note Cisco no longer recommends using ah-md5-hmac, esp-md5-hmac, esp-des or esp-3des. Instead, you should
use ah-sha-hmac, esp-sha-hmac or esp-aes. For more information about the latest Cisco cryptographic
recommendations, see the Next Generation Encryption (NGE) white paper.
A transform set represents a certain combination of security protocols and algorithms. During the IPsec SA
negotiation, the peers agree to use a particular transform set for protecting a particular data flow.
You can specify multiple transform sets, and then specify one or more of these transform sets in a crypto
map entry. The transform set defined in the crypto map entry is used in the IPsec SA negotiation to protect
the data flows specified by that crypto map entry’s access list.
During IPsec security association negotiations with IKE, peers search for an identical transform set for both
peers. When such a transform set is found, it is selected and applied to the protected traffic as part of both
peers’ IPsec SAs. (With manually established SAs, there is no negotiation with the peer, so both sides must
specify the same transform set.)
If you change a transform set definition, the change is only applied to crypto map entries that reference the
transform set. The change is not applied to existing security associations, but is used in subsequent
negotiations to establish new SAs. If you want the new settings to take effect sooner, you can clear all or
part of the SA database by using the clear crypto sa command.
The table below shows allowed transform combinations.
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
15
Cisco IOS Suite-B Support for IKE and IPsec Cryptographic Algorithms
About Transform Sets
Cisco IOS Suite-B Support for IKE and IPsec Cryptographic Algorithms
Suite-B adds support for four user interface suites of cryptographic algorithms for use with IKE and IPSec
that are described in RFC 4869. Each suite consists of an encryption algorithm, a digital signature
algorithm, a key agreement algorithm, and a hash or message digest algorithm.
Suite-B has the following cryptographic algorithms:
• Suite-B-GCM-128-Provides ESP integrity protection, confidentiality, and IPsec encryption algorithms
that use the 128-bit AES using Galois and Counter Mode (AES-GCM) described in RFC 4106. This
suite should be used when ESP integrity protection and encryption are both needed.
• Suite-B-GCM-256-Provides ESP integrity protection and confidentiality using 256-bit AES-GCM
described in RFC 4106. This suite should be used when ESP integrity protection and encryption are
both needed.
• Suite-B-GMAC-128-Provides ESP integrity protection using 128-bit AES- Galois Message
Authentication Code (GMAC) described in RFC 4543, but does not provide confidentiality. This suite
should be used only when there is no need for ESP encryption.
• Suite-B-GMAC-256-Provides ESP integrity protection using 256-bit AES-GMAC described in RFC
4543, but does not provide confidentiality. This suite should be used only when there is no need for
ESP encryption.
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
16
Configuring Security for VPNs with IPsec
Suite-B Requirements
IPSec encryption algorithms use AES-GCM when encryption is required and AES-GMAC for message
integrity without encryption.
IKE negotiation uses AES Cipher Block Chaining (CBC) mode to provide encryption and Secure Hash
Algorithm (SHA)-2 family containing the SHA-256 and SHA-384 hash algorithms, as defined in RFC
4634, to provide the hash functionality. Diffie-Hellman using Elliptic Curves (ECP), as defined in RFC
4753, is used for key exchange and the Elliptic Curve Digital Signature Algorithm (ECDSA), as defined in
RFC 4754, to provide authentication.
Suite-B Requirements
Suite-B imposes the following software crypto engine requirements for IKE and IPsec:
• HMAC-SHA256 and HMAC-SHA384 are used as pseudorandom functions; the integrity check within
the IKE protocol is used. Optionally, HMAC-SHA512 can be used.
• Elliptic curve groups 19 (256-bit ECP curve) and 20 (384-bit ECP curve) are used as the Diffie-
Hellman group in IKE. Optionally, group 21 (521-bit ECP curve) can be used.
• The Elliptic Curve Digital Signature Algorithm (ECDSA) algorithm (256-bit and 384-bit curves) is
used for the signature operation within X.509 certificates.
• GCM (16 byte ICV) and GMAC is used for ESP (128-bit and 256-bit keys). Optionally, 192-bit keys
can be used.
• Public Key Infrastructure (PKI) support for validation of X.509 certificates using ECDSA signatures
must be used.
• PKI support for generating certificate requests using ECDSA signatures and for importing the issued
certificates into IOS must be used.
• IKEV2 support for allowing the ECDSA signature (ECDSA-sig) as authentication method must be
used.
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
17
Crypto Map Sets
About Crypto Maps
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
18
Configuring Security for VPNs with IPsec
Load Sharing Among Crypto Maps
• The crypto map entries must contain compatible crypto access lists (for example, mirror image access
lists). In cases, where the responding peer is using dynamic crypto maps, the entries in the local crypto
access list must be “permitted” by the peer’s crypto access list.
• The crypto map entries must each identify the other peer (unless the responding peer is using dynamic
crypto maps).
• The crypto map entries must have at least one transform set in common.
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
19
Configuring Security for VPNs with IPsec
Dynamic Crypto Maps
Note Use care when using the any keyword in permit entries in dynamic crypto maps. If the traffic covered by
such a permit entry can include multicast or broadcast traffic, the access list should include deny entries
for the appropriate address range. Access lists should also include deny entries for network and subnet
broadcast traffic, and for any other traffic that should not be IPsec protected.
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
20
Configuring Security for VPNs with IPsec
Tunnel Endpoint Discovery
Note TED only helps in discovering peers and does not function any differently than normal IPsec. TED does
not improve the scalability of IPsec (in terms of performance or the number of peers or tunnels).
The figure below and the corresponding steps explain a sample TED network topology.
SUMMARY STEPS
1. Host A sends a packet that is destined for Host B.
2. Router 1 intercepts and reads the packet. According to the IKE policy, Router 1 contains the following
information: the packet must be encrypted, there are no SAs for the packet, and TED is enabled. Thus,
Router 1 drops the packet and sends a TED probe into the network. (The TED probe contains the IP
address of Host A (as the source IP address) and the IP address of Host B (as the destination IP address)
embedded in the payload.
3. Router 2 intercepts the TED probe and checks the probe against the ACLs that it protects; after the
probe matches an ACL, it is recognized as a TED probe for proxies that the router protects. The probe
then sends a TED reply with the IP address of Host B (as the source IP address) and the IP address of
Host A (as the destination IP address) embedded in the payload.
4. Router 1 intercepts the TED reply and checks the payloads for the IP address and half proxy of Router
2. It then combines the source side of its proxy with the proxy found in the second payload and initiates
an IKE session with Router 2; thereafter, Router 1 initiates an IPsec session with Router 2.
DETAILED STEPS
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
21
Configuring Security for VPNs with IPsec
Tunnel Endpoint Discovery
and sends a TED probe into the network. (The TED probe contains the IP address of Host A (as the source IP address)
and the IP address of Host B (as the destination IP address) embedded in the payload.
Step 3 Router 2 intercepts the TED probe and checks the probe against the ACLs that it protects; after the probe matches an
ACL, it is recognized as a TED probe for proxies that the router protects. The probe then sends a TED reply with the
IP address of Host B (as the source IP address) and the IP address of Host A (as the destination IP address) embedded
in the payload.
Step 4 Router 1 intercepts the TED reply and checks the payloads for the IP address and half proxy of Router 2. It then
combines the source side of its proxy with the proxy found in the second payload and initiates an IKE session with
Router 2; thereafter, Router 1 initiates an IPsec session with Router 2.
Note IKE cannot occur until the peer is identified.
TED Versions
The following table lists the available TED versions:
TED Restrictions
TED has the following restrictions:
• It is Cisco proprietary.
• It is available only on dynamic crypto maps. (The dynamic crypto map template is based on the
dynamic crypto map performing peer discovery. Although there are no access-list restrictions on the
dynamic crypto map template, the dynamic crypto map template should cover data sourced from the
protected traffic and the receiving router using the any keyword. When using the any keyword,
include explicit deny statements to exempt routing protocol traffic prior to entering the permit any
command.
• TED works only in tunnel mode; that is, it does not work in transport mode.
• It is limited by the performance and scalability of the limitation of IPsec on each individual platform.
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
22
Configuring Security for VPNs with IPsec
Redundant Interfaces Sharing the Same Crypto Map
Note Enabling TED slightly decreases the general scalability of IPsec because of the set-up
overhead of peer discovery, which involves an additional “round-trip” of IKE messages
(TED probe and reply). Although minimal, the additional memory used to store data
structures during the peer discovery stage adversely affects the general scalability of
IPsec.
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
23
Creating Crypto Access Lists
How to Configure IPsec VPNs
Note Access lists for crypto map entries tagged as ipsec-manual are restricted to a single permit entry and
subsequent entries are ignored. In other words, the SAs established by that particular crypto map entry are
only for a single data flow. To support multiple manually established SAs for different kinds of traffic,
define multiple crypto access lists, and apply each one to a separate ipsec-manual crypto map entry. Each
access list should include one permit statement defining what traffic to protect.
1. enable
2. configure terminal
3. Do one of the following:
•access-list access-list-number {deny | permit} protocol source source-wildcard destination
destination-wildcard [log]
• ip access-list extended name
4. Repeat Step 3 for each crypto access list you want to create.
DETAILED STEPS
Example:
Device# configure terminal
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
24
Configuring Transform Sets for IKEv1 and IKEv2 Proposals
What to Do Next
Step 4 Repeat Step 3 for each crypto access list you want to —
create.
What to Do Next
After at least one crypto access list is created, a transform set needs to be defined as described in the
“Configuring Transform Sets for IKEv1 and IKEv2 Proposals, page 25” section.
Next the crypto access lists need to be associated to particular interfaces when you configure and apply
crypto map sets to the interfaces. (Follow the instructions in the “Creating Crypto Map Sets, page 30”
and “Applying Crypto Map Sets to Interfaces, page 40” sections).
• Restrictions, page 25
• Configuring Transform Sets for IKEv1, page 26
• Configuring Transform Sets for IKEv2, page 27
Restrictions
If you are specifying SEAL encryption, note the following restrictions:
• Your router and the other peer must not have a hardware IPsec encryption.
• Your router and the other peer must support IPsec.
• Your router and the other peer must support the k9 subsystem.
• SEAL encryption is available only on Cisco equipment. Therefore, interoperability is not possible.
• Unlike IKEv1, the authentication method and SA lifetime are not negotiable in IKEv2, and because of
this, these parameters cannot be configured under the IKEv2 proposal.
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
25
Configuring Security for VPNs with IPsec
Configuring Transform Sets for IKEv1
SUMMARY STEPS
1. enable
2. configure terminal
3. crypto ipsec transform-set transform-set-name transform1 [transform2 [transform3]]
4. mode [tunnel | transport]
5. end
6. clear crypto sa [peer {ip-address | peer-name} | sa map map-name | sa entry destination-address
protocol spi]
7. show crypto ipsec transform-set [tag transform-set-name]
DETAILED STEPS
Example:
Device# configure terminal
Step 3 crypto ipsec transform-set transform-set- Defines a transform set and enters crypto transform configuration mode.
name transform1 [transform2 [transform3]]
• There are complex rules defining the entries that you can use for
transform arguments. These rules are explained in the command
description for the crypto ipsec transform-set command, and the
Example:
Device(config)# crypto ipsec transform-
table in “About Transform Sets, page 14” section provides a list of
set aesset esp-aes 256 esp-sha-hmac allowed transform combinations.
Step 4 mode [tunnel | transport] (Optional) Changes the mode associated with the transform set.
• The mode setting is applicable only to traffic whose source and
destination addresses are the IPsec peer addresses; it is ignored for
Example:
Device(cfg-crypto-tran)# mode transport
all other traffic. (All other traffic is in tunnel mode only.)
Step 5 end Exits crypto transform configuration mode and enters privileged EXEC
mode.
Example:
Device(cfg-crypto-tran)# end
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
26
Configuring Security for VPNs with IPsec
What to Do Next
Step 7 show crypto ipsec transform-set [tag (Optional) Displays the configured transform sets.
transform-set-name]
Example:
Device# show crypto ipsec transform-set
What to Do Next
After you have defined a transform set, you should create a crypto map as specified in the “Creating Crypto
Map Sets, page 30” section.
SUMMARY STEPS
1. enable
2. configure terminal
3. crypto ikev2 proposal proposal-name
4. encryption transform1 [transform2] ...
5. integrity transform1 [transform2] ...
6. group transform1 [transform2] ...
7. end
8. show crypto ikev2 proposal
DETAILED STEPS
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
27
Configuring Security for VPNs with IPsec
Configuring Transform Sets for IKEv2
Example:
Device# configure terminal
Step 3 crypto ikev2 proposal proposal- Specifies the name of the proposal and enters crypto IKEv2 proposal configuration
name mode.
• The proposals are referred in IKEv2 policies through the proposal name.
Example:
Device(config)# crypto ikev2
proposal proposal-1
Step 4 encryption transform1 (Optional) Specifies one or more transforms of the following encryption type:
[transform2] ...
• AES-CBC 128—128-bit AES-CBC
• AES-CBC 192—192-bit AES-CBC
Example: • AES-CBC 256—256-bit AES-CBC
Device(config-ikev2- • 3DES—168-bit DES (No longer recommended. AES is the recommended
proposal)# encryption aes- encryption algorithm).
cbc-128
Step 5 integrity transform1 [transform2] ... (Optional) Specifies one or more transforms of the following integrity type:
• The sha256 keyword specifies SHA-2 family 256-bit (HMAC variant) as the
hash algorithm.
Example:
Device(config-ikev2- • The sha384 keyword specifies SHA-2 family 384-bit (HMAC variant) as the
proposal)# integrity sha1 hash algorithm.
• The sha512 keyword specifies SHA-2 family 512-bit (HMAC variant) as the
hash algorithm
• the sha1 keyword specifies the SHA-1 (HMAC variant) as the hash algorithm.
• The md5 keyword specifies MD5 (HMAC variant) as the hash algorithm. (No
longer recommended. SHA-1 is the recommended replacement.)
Step 6 group transform1 [transform2] ... (Optional) Specifies one or more transforms of the possible DH group type:
• 1—768-bit DH (No longer recommended.)
Example: • 2—1024-bit DH (No longer recommended)
Device(config-ikev2- • 5—1536-bit DH (No longer recommended)
proposal)# group 14 • 14—Specifies the 2048-bit DH group.
• 15—Specifies the 3072-bit DH group.
• 16—Specifies the 4096-bit DH group.
• 19—Specifies the 256-bit elliptic curve DH (ECDH) group.
• 20—Specifies the 384-bit ECDH group.
• 24—Specifies the 2048-bit DH/DSA group.
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
28
Configuring Security for VPNs with IPsec
Transform Sets for IKEv2 Examples
Example:
Device(config-ikev2-
proposal)# end
Step 8 show crypto ikev2 proposal (Optional) Displays the parameters for each IKEv2 proposal.
Example:
Device# show crypto ikev2
proposal
The IKEv2 proposal proposal-2 translates to the following prioritized list of transform combinations:
• aes-cbc-128, sha1, 14
• aes-cbc-128, sha1, 15
• aes-cbc-128, sha256, 14
• aes-cbc-128, sha256, 15
• aes-cbc-192, sha1, 14
• aes-cbc-192, sha1, 15
• aes-cbc-192, sha256, 14
• aes-cbc-192, sha256, 15
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
29
Creating Crypto Map Sets
What to Do Next
In the scenario, the initiator’s choice of algorithms is preferred and the selected algorithms are as follows:
encryption aes-cbc-128
integrity sha1
group 14
What to Do Next
After you have defined a transform set, you should create a crypto map as specified in the “Creating Crypto
Map Sets, page 30” section.
Note Security threats, as well as the cryptographic technologies to help protect against them, are constantly
changing. For more information about the latest Cisco cryptographic recommendations, see the Next
Generation Encryption (NGE) white paper.
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
30
Configuring Security for VPNs with IPsec
Creating Static Crypto Maps
SUMMARY STEPS
1. enable
2. configure terminal
3. crypto map [ipv6] map-name seq-num [ipsec-isakmp]
4. match address access-list-id
5. set peer {hostname | ip-address}
6. set transform-set transform-set-name1 [transform-set-name2...transform-set-name6]
7. set security-association lifetime {seconds seconds | kilobytes kilobytes | kilobytes disable}
8. set security-association level per-host
9. set pfs [group1 | group14 | group15 | group16 | group19 | group2 | group20 | group24 | group5]
10. end
11. show crypto map [interface interface | tag map-name]
DETAILED STEPS
Example:
Device# configure terminal
Step 3 crypto map [ipv6] map-name seq-num [ipsec- Creates or modifies a crypto map entry, and enters crypto map
isakmp] configuration mode.
• For IPv4 crypto maps, use the command without the ipv6 keyword.
Example:
Device(config)# crypto map static-map
1 ipsec-isakmp
Step 5 set peer {hostname | ip-address} Specifies a remote IPsec peer—the peer to which IPsec protected traffic
can be forwarded.
• Repeat for multiple remote peers.
Example:
Device(config-crypto-m)# set-peer
192.168.101.1
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
31
Configuring Security for VPNs with IPsec
Creating Static Crypto Maps
Step 7 set security-association lifetime {seconds (Optional) Specifies a SA lifetime for the crypto map entry.
seconds | kilobytes kilobytes | kilobytes
• By default, the SAs of the crypto map are negotiated according to
disable}
the global lifetimes, which can be disabled.
Example:
Device (config-crypto-m)# set security-
association lifetime seconds 2700
Step 8 set security-association level per-host (Optional) Specifies that separate SAs should be established for each
source and destination host pair.
• By default, a single IPsec “tunnel” can carry traffic for multiple
Example:
Device(config-crypto-m)# set security-
source hosts and multiple destination hosts.
association level per-host
Caution Use this command with care because multiple streams between
given subnets can rapidly consume resources.
Step 9 set pfs [group1 | group14 | group15 | (Optional) Specifies that IPsec either should ask for password forward
group16 | group19 | group2 | group20 | secrecy (PFS) when requesting new SAs for this crypto map entry or
group24 | group5] should demand PFS in requests received from the IPsec peer.
• Group 1 specifies the 768-bit Diffie-Hellman (DH) identifier
(default). (No longer recommended).
Example:
Device(config-crypto-m)# set pfs • Group 2 specifies the 1024-bit DH identifier. (No longer
group14 recommended).
• Group 5 specifies the 1536-bit DH identifier. (No longer
recommended)
• Group 14 specifies the 2048-bit DH identifier.
• Group 15 specifies the 3072-bit DH identifier.
• Group 16 specifies the 4096-bit DH identifier.
• Group 19 specifies the 256-bit elliptic curve DH (ECDH) identifier.
• Group 20 specifies the 384-bit ECDH identifier.
• Group 24 specifies the 2048-bit DH/DSA identifier
• By default, PFS is not requested. If no group is specified with this
command, group 1 is used as the default.
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
32
Configuring Security for VPNs with IPsec
Troubleshooting Tips
Example:
Device(config-crypto-m)# end
Step 11 show crypto map [interface interface | tag Displays your crypto map configuration.
map-name]
Example:
Device# show crypto map
Troubleshooting Tips
Certain configuration changes take effect only when negotiating subsequent SAs. If you want the new
settings to take immediate effect, you must clear the existing SAs so that they are reestablished with the
changed configuration. If the router is actively processing IPsec traffic, clear only the portion of the SA
database that would be affected by the configuration changes (that is, clear only the SAs established by a
given crypto map set). Clearing the full SA database should be reserved for large-scale changes, or when
the router is processing very little other IPsec traffic.
To clear IPsec SAs, use the clear crypto sa command with appropriate parameters. (Omitting all
parameters clears out the full SA database, which clears active security sessions.)
What to Do Next
After you have successfully created a static crypto map, you must apply the crypto map set to each
interface through which IPsec traffic flows. To complete this task, see the “Applying Crypto Map Sets to
Interfaces, page 40” section.
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
33
Configuring Security for VPNs with IPsec
Creating Dynamic Crypto Maps
Note Security threats, as well as the cryptographic technologies to help protect against them, are constantly
changing. For more information about the latest Cisco cryptographic recommendations, see the Next
Generation Encryption (NGE) white paper.
SUMMARY STEPS
1. enable
2. configure terminal
3. crypto dynamic-map dynamic-map-name dynamic-seq-num
4. set transform-set transform-set-name1 [transform-set-name2...transform-set-name6]
5. match address access-list-id
6. set peer {hostname | ip-address}
7. set security-association lifetime {seconds seconds | kilobytes kilobytes | kilobytes disable}
8. set pfs [group1 | group14 | group15 | group16 | group19 | group2 | group20 | group24 | group5]
9. exit
10. exit
11. show crypto dynamic-map [tag map-name]
12. configure terminal
13. crypto map map-name seq-num ipsec-isakmp dynamic dynamic-map-name [discover]
14. exit
DETAILED STEPS
Example:
Device# configure terminal
Step 3 crypto dynamic-map dynamic-map-name Creates a dynamic crypto map entry and enters crypto map configuration
dynamic-seq-num mode.
Example:
Device(config)# crypto dynamic-map
test-map 1
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
34
Configuring Security for VPNs with IPsec
Creating Dynamic Crypto Maps
Step 5 match address access-list-id (Optional) Specifies the list number or name of an extended access list.
• This access list determines which traffic should be protected by IPsec
and which traffic should not be protected by IPsec security in the
Example:
Device(config-crypto-m)# match
context of this crypto map entry.
address 101
Note Although access lists are optional for dynamic crypto maps, they are
highly recommended.
Step 6 set peer {hostname | ip-address} (Optional) Specifies a remote IPsec peer. Repeat this step for multiple
remote peers.
Note This is rarely configured in dynamic crypto map entries. Dynamic
Example: crypto map entries are often used for unknown remote peers.
Device(config-crypto-m)# set peer
192.168.101.1
Step 7 set security-association lifetime {seconds (Optional) Overrides (for a particular crypto map entry) the global lifetime
seconds | kilobytes kilobytes | kilobytes value, which is used when negotiating IP Security SAs.
disable} Note To minimize the possibility of packet loss when rekeying in high
bandwidth environments, you can disable the rekey request triggered
by a volume lifetime expiry.
Example:
Device(config-crypto-m)# set
security-association lifetime
seconds 7200
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
35
Configuring Security for VPNs with IPsec
Creating Dynamic Crypto Maps
Step 9 exit Exits crypto map configuration mode and returns to global configuration
mode.
Example:
Device(config-crypto-m)# exit
Example:
Device(config)# exit
Step 11 show crypto dynamic-map [tag map- (Optional) Displays information about dynamic crypto maps.
name]
Example:
Device# show crypto dynamic-map
Example:
Device# configure terminal
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
36
Configuring Security for VPNs with IPsec
Troubleshooting Tips
Example:
Device(config)# exit
Troubleshooting Tips
Certain configuration changes take effect only when negotiating subsequent SAs. If you want the new
settings to take immediate effect, you must clear the existing SAs so that they are reestablished with the
changed configuration. If the router is actively processing IPsec traffic, clear only the portion of the SA
database that would be affected by the configuration changes (that is, clear only the SAs established by a
given crypto map set). Clearing the entire SA database must be reserved for large-scale changes, or when
the router is processing minimal IPsec traffic.
To clear IPsec SAs, use the clear crypto sa command with appropriate parameters. (Omitting all
parameters clears the full SA database, which clears active security sessions.)
What to Do Next
After you have successfully created a crypto map set, you must apply the crypto map set to each interface
through which IPsec traffic flows. To complete this task, see the “Applying Crypto Map Sets to Interfaces,
page 40” section.
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
37
Configuring Security for VPNs with IPsec
Creating Crypto Map Entries to Establish Manual SAs
SUMMARY STEPS
1. enable
2. configure terminal
3. crypto map [ipv6] map-name seq-num [ipsec-manual]
4. match address access-list-id
5. set peer {hostname | ip-address}
6. set transform-set transform-set-name
7. Do one of the following:
• set session-key inbound ah spi hex-key-string
• set session-key outbound ah spi hex-key-string
8. Do one of the following:
• set session-key inbound esp spi cipher hex-key-string [authenticator hex-key-string]
• set session-key outbound esp spi cipher hex-key-string [authenticator hex-key-string]
9. exit
10. exit
11. show crypto map [interface interface | tag map-name]
DETAILED STEPS
Example:
Device# configure terminal
Step 3 crypto map [ipv6] map-name seq-num [ipsec-manual] Specifies the crypto map entry to be created or
modified and enters crypto map configuration mode.
• For IPv4 crypto maps, use the crypto map
Example:
Device(config)# crypto map mymap 10 ipsec-manual
command without the ipv6 keyword.
Step 4 match address access-list-id Names an IPsec access list that determines which
traffic should be protected by IPsec and which traffic
should not be protected by IPsec in the context of this
Example: crypto map entry.
Device(config-crypto-m)# match address 102
• The access list can specify only one permit entry
when IKE is not used.
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
38
Configuring Security for VPNs with IPsec
Creating Crypto Map Entries to Establish Manual SAs
Step 6 set transform-set transform-set-name Specifies which transform set should be used.
• This must be the same transform set that is
specified in the remote peer’s corresponding
Example:
Device(config-crypto-m)# set transform-set someset
crypto map entry.
Note Only one transform set can be specified when
IKE is not used.
Step 7 Do one of the following: Sets the AH security parameter indexes (SPIs) and
keys to apply to inbound and outbound protected
• set session-key inbound ah spi hex-key-string traffic if the specified transform set includes the AH
• set session-key outbound ah spi hex-key-string protocol.
• This manually specifies the AH security
Example: association to be used with protected traffic.
Device(config-crypto-m)# set session-key inbound ah
256 98765432109876549876543210987654
Example:
Device(config-crypto-m)# set session-key outbound ah
256 fedcbafedcbafedcfedcbafedcbafedc
Step 8 Do one of the following: Sets the Encapsulating Security Payload (ESP)
Security Parameter Indexes (SPI) and keys to apply to
• set session-key inbound esp spi cipher hex-key-string inbound and outbound protected traffic if the specified
[authenticator hex-key-string] transform set includes the ESP protocol.
• set session-key outbound esp spi cipher hex-key-string
[authenticator hex-key-string] Or
Specifies the cipher keys if the transform set includes
an ESP cipher algorithm. Specifies the authenticator
Example: keys if the transform set includes an ESP authenticator
Device(config-crypto-m)# set session-key inbound esp algorithm.
256 cipher 0123456789012345
• This manually specifies the ESP security
association to be used with protected traffic.
Example:
Device(config-crypto-m)# set session-key outbound esp
256 cipher abcdefabcdefabcd
Example:
Device(config-crypto-m)# exit
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
39
Applying Crypto Map Sets to Interfaces
Troubleshooting Tips
Example:
Device(config)# exit
Step 11 show crypto map [interface interface | tag map-name] Displays your crypto map configuration.
Example:
Device# show crypto map
Troubleshooting Tips
For manually established SAs, you must clear and reinitialize the SAs for the changes to take effect. To
clear IPsec SAs, use the clear crypto sa command with appropriate parameters. (Omitting all parameters
clears the entire SA database, which clears active security sessions.)
What to Do Next
After you have successfully created a crypto map set, you must apply the crypto map set to each interface
through which IPsec traffic flows. To complete this task, see the “Applying Crypto Map Sets to Interfaces,
page 40” section.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type/number
4. crypto map map-name
5. exit
6. crypto map map-name local-address interface-id
7. exit
8. show crypto map [interface interface]
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
40
Configuring Security for VPNs with IPsec
What to Do Next
DETAILED STEPS
Example:
Device# configure terminal
Example:
Device(config)# interface FastEthernet 0/0
Example:
Device(config-if)# crypto map mymap
Example:
Device(config-if)# exit
Step 6 crypto map map-name local-address interface-id (Optional) Permits redundant interfaces to share the
same crypto map using the same local identity.
Example:
Device(config)# crypto map mymap local-address
loopback0
Example:
Device(config)# exit
Step 8 show crypto map [interface interface] (Optional) Displays your crypto map configuration
Example:
Device# show crypto map
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
41
Example: Configuring AES-Based Static Crypto Map
Configuration Examples for IPsec VPN
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
42
Configuring Security for VPNs with IPsec
Additional References
Additional References
Related Documents
IKE, IPsec, and PKI configuration commands: • Cisco IOS Security Command Reference
complete command syntax, command mode, Commands A to C
defaults, usage guidelines, and examples
• Cisco IOS Security Command Reference
Commands D to L
• Cisco IOS Security Command Reference
Commands M to R
• Cisco IOS Security Command Reference
Commands S to Z
Suite-B SHA-2 family (HMAC variant) and Elliptic Configuring Internet Key Exchange for IPsec VPNs
Curve (EC) key pair configuration
Suite-B Integrity algorithm type transform Configuring Internet Key Exchange Version 2
configuration (IKEv2)
Suite-B Elliptic Curve Digital Signature Algorithm Configuring Internet Key Exchange Version 2
(ECDSA) signature (ECDSA-sig) authentication (IKEv2)
method configuration for IKEv2
Suite-B Elliptic curve Diffie-Hellman (ECDH) • Configuring Internet Key Exchange for IPsec
support for IPsec SA negotiation VPNs
• Configuring Internet Key Exchange Version 2
(IKEv2) and FlexVPN Site-to-Site
Suite-B support for certificate enrollment for a PKI Configuring Certificate Enrollment for a PKI
Standards
Standards Title
None —
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
43
Configuring Security for VPNs with IPsec
Feature Information for Security for VPNs with IPsec
MIBs
RFCs
RFCs Title
RFC 2401 Security Architecture for the Internet Protocol
Technical Assistance
Description Link
The Cisco Support and Documentation website http://www.cisco.com/cisco/web/support/
provides online resources to download index.html
documentation, software, and tools. Use these
resources to install and configure the software and
to troubleshoot and resolve technical issues with
Cisco products and technologies. Access to most
tools on the Cisco Support and Documentation
website requires a Cisco.com user ID and
password.
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
44
Configuring Security for VPNs with IPsec
Feature Information for Security for VPNs with IPsec
release train. Unless noted otherwise, subsequent releases of that software release train also support that
feature.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support.
To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
45
Configuring Security for VPNs with IPsec
Feature Information for Security for VPNs with IPsec
Suite-B Support in IOS SW 15.1(2)T Suite-B adds support for four user
Crypto interface suites of cryptographic
algorithms for use with IKE and
IPSec that are described in RFC
4869. Each suite consists of an
encryption algorithm, a digital
signature algorithm, a key
agreement algorithm, and a hash
or message digest algorithm.
The following command was
modified by this feature: crypto
ipsec transform-set.
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
46
Configuring Security for VPNs with IPsec
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S.
and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks.
Third-party trademarks mentioned are the property of their respective owners. The use of the word partner
does not imply a partnership relationship between Cisco and any other company. (1110R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be
actual addresses and phone numbers. Any examples, command display output, network topology diagrams,
and other figures included in the document are shown for illustrative purposes only. Any use of actual IP
addresses or phone numbers in illustrative content is unintentional and coincidental.
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
47
Example: Configuring AES-Based Static Crypto Map
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
48
IPsec Virtual Tunnel Interfaces
IPsec virtual tunnel interfaces (VTIs) provide a routable interface type for terminating IPsec tunnels and
an easy way to define protection between sites to form an overlay network. IPsec VTIs simplify the
configuration of IPsec for protection of remote links, support multicast, and simplify network
management and load balancing.
Note Security threats, as well as the cryptographic technologies to help protect against them, are constantly
changing. For more information about the latest Cisco cryptographic recommendations, see the Next
Generation Encryption (NGE) white paper.
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
49
IPsec Virtual Tunnel Interfaces
Restrictions for IPsec Virtual Tunnel Interface
Proxy
SVTIs support only the “IP any any” proxy.
DVTIs support multiple proxies, but DVTIs do not allow mixing "any any" proxies with non-"any any"
proxies. DVTIs permit only one type at a time, either a single "any any" proxy or multiple "no any any"
proxies.
Stateful Failover
IPsec stateful failover is not supported with IPsec VTIs.
Tunnel Protection
Do not configure the shared keyword when using the tunnel mode ipsec ipv4 command for IPsec IPv4
mode.
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
50
Benefits of Using IPsec Virtual Tunnel Interfaces
Information About IPsec Virtual Tunnel Interface
the unnumbered interface does not belong to the IVRF routing table of the virtual access. In such cases, a
ping to virtual access IP address fails.
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
51
Dynamic Virtual Tunnel Interfaces
Information About IPsec Virtual Tunnel Interface
enable dynamic routing protocols on the tunnel interface without the extra 24 bytes required for GRE
headers, thus reducing the bandwidth for sending encrypted data.
Additionally, multiple Cisco IOS software features can be configured directly on the tunnel interface and
on the physical egress interface of the tunnel interface. This direct configuration allows users to have solid
control on the application of the features in the pre- or post-encryption path.
The figure below illustrates how a SVTI is used.
The IPsec VTI supports native IPsec tunneling and exhibits most of the properties of a physical interface.
Note When configuring IPsec SVTI with high availability (HA), the standby router reload does not affect the
existing security associations.
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
52
Traffic Encryption with the IPsec Virtual Tunnel Interface
Information About IPsec Virtual Tunnel Interface
A DVTI requires minimal configuration on the router. A single virtual template can be configured and
cloned.
The DVTI creates an interface for IPsec sessions and uses the virtual template infrastructure for dynamic
instantiation and management of dynamic IPsec VTIs. The virtual template infrastructure is extended to
create dynamic virtual-access tunnel interfaces. DVTIs are used in hub-and-spoke configurations. A single
DVTI can support several static VTIs.
Note DVTI is supported only in Easy VPNs. That is, the DVTI end must be configured as an Easy VPN server.
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
53
IPsec Virtual Tunnel Interfaces
Information About IPsec Virtual Tunnel Interface
IPsec packet flow into the IPsec tunnel is illustrated in the figure below.
After packets arrive on the inside interface, the forwarding engine switches the packets to the VTI, where
they are encrypted. The encrypted packets are handed back to the forwarding engine, where they are
switched through the outside interface.
The figue below shows the packet flow out of the IPsec tunnel.
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
54
Multi-SA Support for Dynamic Virtual Tunnel Interfaces for IKEv1
Information About IPsec Virtual Tunnel Interface
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
55
Dynamic Virtual Tunnel Interface Life Cycle
How to Configure IPsec Virtual Tunnel Interface
The IKEv2 authorization policy, which is a container of IKEv2 local AAA group authorization parameters,
contains an AAA attribute AAA_AT_IPSEC_FLOW_LIMIT and theipsec flow- limit command. This
attribute limits the number of IPsec flows that can terminate on an IPSec DVTI virtual access interface.
The value specified by the ipsec flow- limit command from the AAA overrides the value set by the set
security-policy limit command from the IPSec profile. Any change to the value set by the set security-
policy limit command in the IPSec profile is not applied to the current session but is applied to subsequent
sessions.
If the value set by the set security-policy limit command is overridden by AAA, then the value from the
IPSec profile is ignored, and any change to the value set by the set security-policy limit command in the
IPSec profile does not affect the virtual access.
VRF and Scalability of Baseline Configuration for IKEv2
The IKEv2 multi-SA does not allow simultaneous configuration of a VRF and a template on the IKEv2
profile. Instead, the VRF can be configured on AAA and applied to the virtual access interface at the time
of its creation.
You can use the AAA attribute INTERFACE_CONFIG to specify the ip vrf forwarding, ip unnumbered
commands, and other interface configuration mode commands that are applied on the virtual access
interface.
Note If you override VRF using AAA, you must also specify the ip unnumbered command using AAA because
the ip vrf forwarding command removes the ip unnumbered command configuration from the interface.
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
56
Configuring Static IPsec Virtual Tunnel Interfaces
How to Configure IPsec Virtual Tunnel Interface
1. enable
2. configure terminal
3. crypto IPsec profile profile-name
4. set transform-set transform-set-name [transform-set-name2...transform-set-name6]
5. exit
6. interface type number
7. ip address address mask
8. tunnel mode ipsec ipv4
9. tunnel source interface-type interface-type
10. tunnel destination ip-address
11. tunnel protection IPsec profile profile-name [shared]
12. end
DETAILED STEPS
Router> enable
Example:
Step 3 crypto IPsec profile profile-name Defines the IPsec parameters that are to be used for
IPsec encryption between two IPsec routers, and
enters IPsec profile configuration mode.
Example:
Step 4 set transform-set transform-set-name [transform-set- Specifies which transform sets can be used with the
name2...transform-set-name6] crypto map entry.
Example:
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
57
IPsec Virtual Tunnel Interfaces
How to Configure IPsec Virtual Tunnel Interface
Example:
Router(ipsec-profile)# exit
Step 6 interface type number Specifies the interface on which the tunnel will be
configured and enters interface configuration mode.
Example:
Example:
Step 8 tunnel mode ipsec ipv4 Defines the mode for the tunnel.
Example:
Step 9 tunnel source interface-type interface-type Specifies the tunnel source as a loopback interface.
Example:
Step 10 tunnel destination ip-address Identifies the IP address of the tunnel destination.
Example:
Step 11 tunnel protection IPsec profile profile-name [shared] Associates a tunnel interface with an IPsec profile.
Example:
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
58
Configuring Dynamic IPsec Virtual Tunnel Interfaces
How to Configure IPsec Virtual Tunnel Interface
Example:
Router(config-if)# end
1. enable
2. configure terminal
3. crypto ipsec profile profile-name
4. set transform-set transform-set-name [transform-set-name2...transform-set-name6]
5. exit
6. interface virtual-template number
7. tunnel mode ipsec ipv4
8. tunnel protection IPsec profile profile-name [shared]
9. exit
10. crypto isakamp profile profile-name
11. match identity addressip-addressmask
12. virtual template template-number
13. end
DETAILED STEPS
Router> enable
Example:
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
59
IPsec Virtual Tunnel Interfaces
How to Configure IPsec Virtual Tunnel Interface
Step 4 set transform-set transform-set-name [transform-set- Specifies which transform sets can be used with the
name2...transform-set-name6] crypto map entry.
Example:
Example:
Router(ipsec-profile)# exit
Step 6 interface virtual-template number Defines a virtual-template tunnel interface and enters
interface configuration mode.
Example:
Step 7 tunnel mode ipsec ipv4 Defines the mode for the tunnel.
Example:
Step 8 tunnel protection IPsec profile profile-name [shared] Associates a tunnel interface with an IPsec profile.
Example:
Example:
Router(config-if)# exit
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
60
Configuring Multi-SA Support for Dynamic Virtual Tunnel Interfaces Using IKEv1
How to Configure IPsec Virtual Tunnel Interface
Example:
Step 11 match identity addressip-addressmask Matches an identity from the ISAKMP profile and
enters isakmp-profile configuration mode.
Example:
Router(conf-isa-prof)# match identity address
10.1.1.0 255.255.255.0
Step 12 virtual template template-number Specifies the virtual template attached to the
ISAKAMP profile.
Example:
Router(config)# virtual-template 1
Example:
Router(config)# end
Note Security threats, as well as the cryptographic technologies to help protect against them, are constantly
changing. For more information about the latest Cisco cryptographic recommendations, see the Next
Generation Encryption (NGE) white paper.
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
61
IPsec Virtual Tunnel Interfaces
How to Configure IPsec Virtual Tunnel Interface
SUMMARY STEPS
1. enable
2. configure terminal
3. ip vrf vrf-name
4. rd route-distinguisher
5. exit
6. crypto keyring keyring-name
7. pre-shared-keyaddress key key
8. exit
9. crypto isakmp profile profile-name
10. keyring keyring-name
11. match identity address mask
12. virtual-template template-number
13. exit
14. crypto ipsec transform-set transform-set-name transform1 [transform2] [transform3]
15. exit
16. crypto ipsec profilename
17. set security-policy limitmaximum-limit
18. set transform-settransform-set-name [transform-set-name2 .... transform-set-name6]
19. exit
20. interface virtual-template number type tunnel
21. ipvrfforwardingvrf-name
22. ip unnumberedtype number
23. tunnel modeipsec ipv4ipv4
24. tunnelprotectionprofileipsec profile-name [shared]
25. end
DETAILED STEPS
Step 1 enable
Example:
Router> enable
Enables privileged EXEC mode.
Step 2 configure terminal
Example:
Router# configure terminal
Enters global configuration mode.
Step 3 ip vrf vrf-name
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
62
IPsec Virtual Tunnel Interfaces
How to Configure IPsec Virtual Tunnel Interface
Example:
Router(config)# ip vrf VRF-100-1
Example:
Router(config-vrf)# rd 100:21
Example:
Router(config-vrf)# exit
Example:
Router(config)# crypto keyring cisco-100-1
Defines a crypto key ring and enters key ring configuration mode.
Step 7 pre-shared-keyaddress key key
Example:
Router(config-keyring)# pre-shared-key address
10.1.1.1 key cisco-100-1
Defines the preshared key to be used for Internet Key Exchange (IKE) authentication.
Step 8 exit
Example:
Router(config-keyring)# exit
Example:
Router(config)# crypto isakmp profile
cisco-isakmp-profile-100-1
Example:
Router(conf-isa-prof)# keyring cisco-100-1
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
63
IPsec Virtual Tunnel Interfaces
How to Configure IPsec Virtual Tunnel Interface
Example:
Router(conf-isa-prof)# match identity address
10.1.1.0 255.255.255.0
Example:
Router(conf-isa-prof)# virtual-template 101
Specifies the virtual template that will be used to clone virtual access interfaces.
Step 13 exit
Example:
Router(conf-isa-prof)# exit
Exits ISAKMP profile configuration mode and enters global configuration mode.
Step 14 crypto ipsec transform-set transform-set-name transform1 [transform2] [transform3]
Example:
Router(config)# crypto ipsec transform-set cisco
esp-aes esp-sha-hmac
Defines the transform set and enters crypto transform configuration mode.
Step 15 exit
Example:
Router(conf-crypto-trans)# exit
Exits crypto transform configuration mode and enters global configuration mode.
Step 16 crypto ipsec profilename
Example:
Router(config)# crypto ipsec profile
cisco-ipsec-profile-101
Defines the IPsec parameters used for IPsec encryption between two IPsec routers, and enters IPsec profile
configuration mode.
Step 17 set security-policy limitmaximum-limit
Example:
Router(ipsec-profile)# set security-policy
limit 3
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
64
IPsec Virtual Tunnel Interfaces
How to Configure IPsec Virtual Tunnel Interface
Defines the IPsec parameters used for IPsec encryption between two IPsec routers, and enters IPsec profile
configuration mode.
Step 18 set transform-settransform-set-name [transform-set-name2 .... transform-set-name6]
Example:
Router(ipsec-profile)# set transform-set cisco
Specifies the transform sets to be used with the crypto map entry.
Step 19 exit
Example:
Router(ipsec-profile)# exit
Example:
Router(config)# interface virtual-template 101 type tunnel
Creates a virtual template interface that can be configured interface and enters interface configuration mode.
Step 21 ipvrfforwardingvrf-name
Example:
Router(config-if)# ip vrf forwarding VRF-100-1
Example:
Router(config-if)# ip unnumbered GigabitEthernet 0.0
Example:
Router(config-if)# tunnel mode ipsec ipv4
Example:
Router(config-if)# tunnel protection ipsec
profile PROF
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
65
Configuring Multi-SA Support for Dynamic Virtual Tunnel Interfaces Using IKEv2
Defining an AAA Attribute List
Example:
Router(config-if)# end
SUMMARY STEPS
1. enable
2. configure terminal
3. aaanew-model
4. aaaauthorizationnetworklist-namelocal
5. aaaattribute listlist-name
6. attributetypename value
7. attributetypename value
8. aaa session-idcommon
9. end
DETAILED STEPS
Example:
Router> enable
Example:
Router# configure terminal
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
66
IPsec Virtual Tunnel Interfaces
Configuring the VRF
Example:
Router(config)# aaa new-model
Example:
Router(config)# aaa authorization network group-
list local
Step 5 aaaattribute listlist-name Specifies an AAA attribute list that is defined in global
configuration mode.
• The “interface-config” attribute in the AAA attribute
Example:
Router(config)# aaa attribute list aaa-cisco-ikev2-
list is used to apply interface commands on the virtual
profile-100-1 access interface associated with the IKEv2 session.
Example:
Router(config)# attribute type interface-config
"ip vrf forwarding VRF-100-1"
Example:
Router(config)# attribute type interface-config
"ip unnumbered Ethernet 0/0"
Step 8 aaa session-idcommon Ensures that the same session ID will be used for each
AAA accounting service type within a call.
Example:
Router(config)# aaa session-id common
Example:
Router(config)# end
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
67
IPsec Virtual Tunnel Interfaces
Configuring the VRF
SUMMARY STEPS
1. enable
2. configure terminal
3. ipvrf vrf-name
4. rdroute-distinguisher
5. route-targetexport loute-target-ext-community
6. route-targetimportroute-target-ext-community
7. end
DETAILED STEPS
Example:
Router> enable
Example:
Router# configure terminal
Step 3 ipvrf vrf-name Defines the VRF instance and enters VRF configuration mode.
Example:
Router(config)# ip vrf VRF-100-1
Example:
Router(config-vrf)# rd 100:21
Step 5 route-targetexport loute-target-ext-community (Optional) Creates a route-target export extended community for a
VRF.
Example:
Router(config-vrf)# route-target export 101:1
Example:
Router(config-vrf)# route-target import 101:1
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
68
IPsec Virtual Tunnel Interfaces
Configuring Internet Key Exchange Version 2 (IKEv2)
Example:
Router(config)# end
Note Security threats, as well as the cryptographic technologies to help protect against them, are constantly
changing. For more information about the latest Cisco cryptographic recommendations, see the Next
Generation Encryption (NGE) white paper.
Although the IKEv2 proposal is similar to the crypto isakmp policy command, the IKEv2 proposal differs
as follows:
• An IKEv2 proposal allows configuring one or more transforms for each transform type.
• An IKEv2 proposal does not have any associated priority.
SUMMARY STEPS
1. enable
2. configure terminal
3. crypto ikev2 proposal name
4. encryption {3des} {aes-cbc-128} {aes-cbc-192} {aes-cbc-256}
5. integrity {md5} {sha1} {sha256} {sha384} {sha512}
6. group {1} {14} {15} {16} {19} {2} {20} {24} {5}
7. end
8. show crypto ikev2 proposal [name | default]
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
69
IPsec Virtual Tunnel Interfaces
Configuring IKEv2 Proposal
DETAILED STEPS
Example:
Device# configure terminal
Step 3 crypto ikev2 proposal name Overrides the default IKEv2 proposal, defines an IKEv2 proposal name, and enters
IKEv2 proposal configuration mode.
Example:
Device(config)# crypto ikev2
proposal proposal1
Step 4 encryption {3des} {aes-cbc-128} Specifies one or more transforms of the encryption type, which are as follows:
{aes-cbc-192} {aes-cbc-256}
• 3des (No longer recommended)
• aes-cbc-128
Example: • aes-cbc-192
Device(config-ikev2-proposal)# • aes-cbc-256
encryption aes-cbc-128 aes-
cbc-192
Step 5 integrity {md5} {sha1} {sha256} Specifies one or more transforms of the integrity algorithm type, which are as
{sha384} {sha512} follows:
• The md5 keyword specifies MD5 (HMAC variant) as the hash algorithm. (No
longer recommended)
Example:
Device(config-ikev2-proposal)# • The sha1 keyword specifies SHA-1 (HMAC variant) as the hash algorithm.
integrity sha1 • The sha256 keyword specifies SHA-2 family 256-bit (HMAC variant) as the
hash algorithm.
• The sha384 keyword specifies SHA-2 family 384-bit (HMAC variant) as the
hash algorithm.
• The sha512 keyword specifies SHA-2 family 512-bit (HMAC variant) as the
hash algorithm.
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
70
IPsec Virtual Tunnel Interfaces
Configuring IKEv2 Policy
Step 7 end Exits IKEv2 proposal configuration mode and returns to privileged EXEC mode.
Example:
Device(config-ikev2-proposal)#
end
Step 8 show crypto ikev2 proposal [name | (Optional) Displays the IKEv2 proposal.
default]
Example:
Device# show crypto ikev2
proposal default
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
71
IPsec Virtual Tunnel Interfaces
Configuring IKEv2 Policy
• An IKEv2 policy can have one or more match address local statements.
• When selecting a policy, multiple match statements of the same type are logically ORed and match
statements of different types are logically ANDed.
• There is no precedence between match statements of different types.
• Configuring overlapping policies is considered a misconfiguration and in case of multiple possible
policy matches, the first policy is selected.
SUMMARY STEPS
1. enable
2. configure terminal
3. crypto ikev2 policy name
4. proposal name
5. match fvrf {fvrf-name | any}
6. match address local {ipv4-address | ipv6-address}
7. end
8. show crypto ikev2 policy [policy-name | default]
DETAILED STEPS
Example:
Device# configure terminal
Step 3 crypto ikev2 policy name Overrides the default IKEv2 policy, defines an IKEv2 policy name
and enters IKEv2 policy configuration mode.
Example:
Device(config)# crypto ikev2 policy policy1
Step 4 proposal name Specifies the proposals that must be used with the policy.
• The proposals are prioritized in the order of listing.
Example: Note You must specify at least one proposal. Optionally, you can
Device(config-ikev2-policy)# proposal specify additional proposals with each proposal in a separate
proposal1
statement.
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
72
IPsec Virtual Tunnel Interfaces
Configuring IKEv2 Keyring
Step 6 match address local {ipv4-address | ipv6-address} (Optional) Matches the policy based on the local IPv4 or IPv6
address. The default is match all the addresses in the configured
FVRF.
Example:
Device(config-ikev2-policy)# match address
local 10.0.0.1
Step 7 end Exits IKEv2 policy configuration mode and returns to privileged
EXEC mode.
Example:
Device(config-ikev2-policy)# end
Step 8 show crypto ikev2 policy [policy-name | default] (Optional) Displays the IKEv2 policy.
Example:
Device# show crypto ikev2 policy policy1
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
73
IPsec Virtual Tunnel Interfaces
Configuring IKEv2 Keyring
On an IKEv2 initiator, IKEv2 keyring key lookup is performed using the peer’s hostname or the address, in
that order. On an IKEv2 responder, the key lookup is performed using the peer’s IKEv2 identity or the
address, in that order.
Note You cannot configure the same identity in more than one peer.
SUMMARY STEPS
1. enable
2. configure terminal
3. crypto ikev2 keyring keyring-name
4. peer name
5. description line-of-description
6. hostname name
7. address {ipv4-address [mask] | ipv6-addressprefix}
8. identity {address {ipv4-address | ipv6-address} | fqdn name | email email-id | key-id key-id}
9. pre-shared-key {local | remote} [0 | 6] line hex hexadecimal-string
10. end
DETAILED STEPS
Example:
Device# configure terminal
Step 3 crypto ikev2 keyring keyring-name Defines an IKEv2 keyring and enters IKEv2 keyring
configuration mode.
Example:
Device(config)# crypto ikev2 keyring kyr1
Step 4 peer name Defines the peer or peer group and enters IKEv2 keyring peer
configuration mode.
Example:
Device(config-ikev2-keyring)# peer peer1
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
74
IPsec Virtual Tunnel Interfaces
Configuring IKEv2 Profile (Basic)
Example:
Device(config-ikev2-keyring-peer)#
description this is the first peer
Example:
Device(config-ikev2-keyring-peer)# peer peer1
Step 7 address {ipv4-address [mask] | ipv6-addressprefix} Specifies an IPv4 or IPv6 address or range for the peer.
Note This IP address is the IKE endpoint address and is
independent of the identity address.
Example:
Device(config-ikev2-keyring-peer)# address
10.0.0.1 255.255.255.0
Step 8 identity {address {ipv4-address | ipv6-address} | Identifies the IKEv2 peer through the following identities:
fqdn name | email email-id | key-id key-id}
• E-mail
• FQDN
Example: • IPv4 or IPv6 address
Device(config-ikev2-keyring-peer)# identity • Key ID
address 10.0.0.5
Note The identity is available for key lookup on the IKEv2
responder only.
Step 9 pre-shared-key {local | remote} [0 | 6] line hex Specifies the preshared key for the peer.
hexadecimal-string
• Enter the local or remote keyword to specify an asymmetric
preshared key. By default, the preshared key is symmetric.
Example: • 0—Specifies that the preshared key is unencrypted.
Device(config-ikev2-keyring-peer)# pre- • 6—Specifies that the preshared key is encrypted.
shared-key local key1 • line—Specifies that the unencrypted user preshared key.
• hex hexadecimal-string—Specifies that the preshared key is
in hexadecimal format.
Step 10 end Exits IKEv2 keyring peer configuration mode and returns to
privileged EXEC mode.
Example:
Device(config-ikev2-keyring-peer)# end
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
75
IPsec Virtual Tunnel Interfaces
Configuring IKEv2 Profile (Basic)
profile. An IKEv2 profile must be configured and associated to either a crypto map or an IPsec profile on
the IKEv2 initiator. Use the set ikev2-profile profile-name command to associate a profile to a crypto map
or an IPsec profile. To disassociate the profile, use the no form of the command.
The following rules apply to the match statements:
• An IKEv2 profile must contain a match identity or a match certificate statement; otherwise, the profile
is considered incomplete and is not used. Optionally, an IKEv2 profile can have more than one match
identity or match certificate statements.
• Optionally, an IKEv2 profile can have a single match Forward VPN Routing and Forwarding (FVRF)
statement.
• When selecting a profile, multiple match statements of the same type are logically ORed, and multiple
match statements of different types are logically ANDed.
• The match identity and match certificate statements are considered as same type of statements and are
ORed.
• Configuring overlapping profiles is considered as misconfiguration and in case of multiple profile
matches, no profile is selected.
Use the show crypto ikev2 profile profile-name command to display the IKEv2 profile.
SUMMARY STEPS
1. enable
2. configure terminal
3. crypto ikev2 profile profile-name
4. description line-of-description
5. aaa accounting {psk | cert | eap} list-name
6. authentication {local {rsa-sig | pre-share | ecdsa-sig | eap} | remote {eap [query-identity | timeout
seconds] | rsa-sig | pre-share | ecdsa-sig}}
7. dpd interval retry-interval {on-demand | periodic}
8. identity local {address {ipv4-address | ipv6-address} | dn | email email-string | fqdn fqdn-string | key-
id opaque-string}
9. initial-contact [force]
10. ivrf name
11. keyring {local keyring-name | aaa list-name name-mangler mangler-name}
12. lifetime seconds
13. match {address local {ipv4-address | ipv6-address | interface name} | certificate certificate-map | fvrf
{fvrf-name | any} | identity remote {address {ipv4-address [mask] | ipv6-address prefix} | email
[domain] string | fqdn [domain] string | key-id opaque-string}}
14. nat keepalive seconds
15. pki trustpoint trustpoint-label [sign | verify]
16. virtual-template number
17. end
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
76
IPsec Virtual Tunnel Interfaces
Configuring IKEv2 Profile (Basic)
DETAILED STEPS
Example:
Device# configure terminal
Step 3 crypto ikev2 profile profile-name Defines an IKEv2 profile and enters IKEv2 profile configuration mode.
Example:
Device(config)# crypto ikev2
profile profile1
Example:
Device(config-ikev2-profile)#
description This is an IKEv2
profile
Step 5 aaa accounting {psk | cert | eap} list- (Optional) Enables AAA accounting for IPsec sessions.
name
• psk—AAA accounting method list for peers authenticating using
preshared key authentication method.
Example: • cert—AAA accounting method list for peers authenticating using
Device(config-ikev2-profile)# certificate authentication method.
aaa accounting eap list1 • eap—AAA accounting method list for peers authenticating using EAP
authentication method.
• list-name—The AAA list name.
Note If the cert, psk, or eap keyword is not specified, the AAA accounting
method list is used irrespective of the peer authentication method.
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
77
IPsec Virtual Tunnel Interfaces
Configuring IKEv2 Profile (Basic)
Step 7 dpd interval retry-interval {on- (Optional) Configures Dead Peer Detection (DPD) globally for peers matching
demand | periodic} the profile.
• on-demand—Verifies if IKE is live on the peer by sending keepalive
before sending data.
Example:
Device(config-ikev2-profile)# • periodic—Verifies if IKE is live by sending keepalives at specified
dpd 1000 250 periodic intervals.
Note DPD is disabled by default.
Step 8 identity local {address {ipv4-address (Optional) Specifies the local IKEv2 identity type.
| ipv6-address} | dn | email email-
• The local identity is used by the local IKEv2 peer to identify itself with the
string | fqdn fqdn-string | key-id
remote IKEv2 peers in the AUTH exchange using the Identification
opaque-string}
Identifier (IDi) field:
• address—IPv4 or IPv6 address.
Example: • dn—Distinguished name.
Device(config-ikev2-profile)# • fqdn—Fully Qualified Domain Name. For example,
identity local email Device1.example.com.
[email protected]
• email—E-mail ID. For example, [email protected].
• key-id—Key ID.
Note If the local authentication method is a preshared key, the default local
identity is the IP address. If the local authentication method is rsa-
signature, the default local identity is Distinguished Name.
Step 9 initial-contact [force] Enforces initial contact processing if the initial contact notification is not
received in the IKE_AUTH exchange.
Example:
Device(config-ikev2-profile)#
initial-contact force
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
78
IPsec Virtual Tunnel Interfaces
Configuring IKEv2 Profile (Basic)
Step 11 keyring {local keyring-name | aaa list- Specifies the local or AAA-based keyring that must be used with the local and
name name-mangler mangler-name} remote preshared key authentication method.
• local—Specifies the local keyring.
Example: • keyring-name—Locally defined keyring name.
Device(config-ikev2-profile)# • aaa—AAA-based preshared keys list name.
keyring aaa keyring1 name- • list-name—AAA method list name.
mangler mangler1
• name-mangler—Derives the username from the peer identity in the
preshared key lookup on the AAA list. If this keyword is not specified, the
entire peer identity is used for key lookup.
• mangler-name—Globally defined name mangler.
Note You can specify only one keyring. Local AAA is not supported for
AAA-based preshared keys.
Note The keyword local and the keyword argument pair name-mangler
mangler-name was added in Cisco IOS Release 15.2(2)T.
Step 12 lifetime seconds Specifies the lifetime in seconds for the IKEv2 SA.
• The range is from 120 to 86400, and the default lifetime is 86400.
Example:
Device(config-ikev2-profile)#
lifetime 1000
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
79
IPsec Virtual Tunnel Interfaces
Configuring IKEv2 Profile (Basic)
Step 14 nat keepalive seconds (Optional) Enables NAT keepalive and specifies the duration in seconds.
• The duration range is from 5 to 3600.
Example: • NAT is disabled by default.
Device(config-ikev2-profile)#
nat keepalive 500
Step 15 pki trustpoint trustpoint-label [sign | Specifies the Public Key Infrastructure (PKI) trustpoints for use with the RSA
verify] signature authentication method as follows:
• sign—Use the certificate from the trustpoint to sign the AUTH payload
sent to the peer.
Example:
Device(config-ikev2-profile)# • verify—Use the certificate from the trustpoint to verify the AUTH payload
pki trustpoint tsp1 sign received from the peer.
Note If the sign or verify keyword is not specified, the trustpoint is used for
signing and verification.
Note In contrast to IKEv1, it is mandatory to configure a trustpoint in an
IKEv2 profile for certificate-based authentication to succeed. There is no
fallback to the globally configured trustpoints if this command is not
present in the configuration. This applies to the IKEv2 initiator and
responder.
Step 16 virtual-template number (Optional) Specifies the virtual template for cloning a virtual access interface.
Note For IPsec Dynamic Virtual Tunnel Interface (DVTI), the virtual template
must be specified in IKEv2 profile without which the IKEv2 session is
Example: not initiated.
Device(config-ikev2-profile)#
virtual-template 125
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
80
IPsec Virtual Tunnel Interfaces
Configuring an IPsec Profile and a Virtual Template
Example:
Device(config-ikev2-profile)# end
SUMMARY STEPS
1. enable
2. configure terminal
3. cryptoipsectransform-setcisco-ipsec-profile
4. exit
5. crypto ipsec profile name
6. settransform-set transform-set-name
7. set reverse-routedistancenumber
8. set reverse-routetagtag-id
9. exit
10. interface virtual-template interface-numbertypetunnel
11. ip unnumbered typenumber
12. tunnel mode ipsec ipv4
13. tunnel protectionipsec ipv4
14. exit
DETAILED STEPS
Example:
Router> enable
Example:
Router# configure terminal
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
81
IPsec Virtual Tunnel Interfaces
Configuring an IPsec Profile and a Virtual Template
Example:
Router(config)# crypto ikev2 profile cisco-ikev2-
profile-100-1
Example:
Router(cfg-crypto-trans)# exit
Step 5 crypto ipsec profile name Defines the IPsec parameters used for IPsec
encryption between two IPsec routers, and enters
IPsec profile configuration mode.
Example:
Router(config)# crypto ipsec profile cisco-ipsec-
profile
Step 6 settransform-set transform-set-name Specifies which transform sets can be used with the
crypto map entry.
Example:
Router(ipsec-profile)# set transform-set tset
Step 7 set reverse-routedistancenumber Defines a distance metric for the static routes.
Example:
Router(ipsec-profile)# set reverse-route distance 10
Example:
Router(ipsec-profile)# set reverse-route tag 321
Example:
Router(ipsec-profile)# exit
Step 10 interface virtual-template interface-numbertypetunnel Defines a virtual-template tunnel interface and enters
interface configuration mode.
Example:
Router(config)# interface virtual-template 1 type
tunnel
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
82
IPsec Virtual Tunnel Interfaces
Configuration Examples for IPsec Virtual Tunnel Interface
Example:
Router(config-if)# ip unnumbered Ethernet 0/0
Step 12 tunnel mode ipsec ipv4 Defines the mode for the tunnel.
Example:
Router(config-if)# tunnel mode ipsec ipv4
Step 13 tunnel protectionipsec ipv4 Associates a tunnel interface with an IPsec profile.
Example:
Router(config-if)# tunnel protection ipsec profile
cisco-ipsec-profile
Example:
Router(config-if)# exit
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
83
Example: Static Virtual Tunnel Interface with IPsec
Configuration Examples for IPsec Virtual Tunnel Interface
• Example: Dynamic Virtual Tunnel Interface Using GRE with IPsec Protection, page 98
version 12.3
service timestamps debug datetime
service timestamps log datetime
hostname 7200-3
no aaa new-model
ip subnet-zero
ip cef
controller ISA 6/1
!
crypto isakmp policy 1
encr aes
authentication pre-share
group 14
crypto isakmp key Cisco12345 address 0.0.0.0 0.0.0.0
crypto ipsec transform-set T1 esp-aes esp-sha-hmac
crypto ipsec profile P1
set transform-set T1
!
interface Tunnel0
ip address 10.0.51.203 255.255.255.0
ip ospf mtu-ignore
load-interval 30
tunnel source 10.0.149.203
tunnel destination 10.0.149.217
tunnel mode IPsec ipv4
tunnel protection IPsec profile P1
!
interface Ethernet3/0
ip address 10.0.149.203 255.255.255.0
duplex full
!
interface Ethernet3/3
ip address 10.0.35.203 255.255.255.0
duplex full
!
ip classless
ip route 10.0.36.0 255.255.255.0 Tunnel0
line con 0
line aux 0
line vty 0 4
end
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
84
IPsec Virtual Tunnel Interfaces
Example: Verifying the Results for the IPsec Static Virtual Tunnel Interface
version 12.3
hostname c1750-17
no aaa new-model
ip subnet-zero
ip cef
crypto isakmp policy 1
encr aes
authentication pre-share
group 14
crypto isakmp key Cisco12345 address 0.0.0.0 0.0.0.0
crypto ipsec transform-set T1 esp-aes esp-sha-hmac
crypto ipsec profile P1
set transform-set T1
!
interface Tunnel0
ip address 10.0.51.217 255.255.255.0
ip ospf mtu-ignore
tunnel source 10.0.149.217
tunnel destination 10.0.149.203
tunnel mode ipsec ipv4
tunnel protection ipsec profile P1
!
interface FastEthernet0/0
ip address 10.0.149.217 255.255.255.0
speed 100
full-duplex
!
interface Ethernet1/0
ip address 10.0.36.217 255.255.255.0
load-interval 30
full-duplex
!
ip classless
ip route 10.0.35.0 255.255.255.0 Tunnel0
line con 0
line aux 0
line vty 0 4
end
• Example: Verifying the Results for the IPsec Static Virtual Tunnel Interface, page 85
Example: Verifying the Results for the IPsec Static Virtual Tunnel Interface
This section provides information that you can use to confirm that your configuration is working properly.
In this display, Tunnel 0 is “up,” and the line protocol is “up.” If the line protocol is “down,” the session is
not active.
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
85
Example: VRF-Aware Static Virtual Tunnel Interface
Example: Verifying the Results for the IPsec Static Virtual Tunnel Interface
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
86
Example: Static Virtual Tunnel Interface with QoS
Example: Verifying the Results for the IPsec Static Virtual Tunnel Interface
The basic SVTI configuration has been modified to include the virtual firewall definition:
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
87
Example: Dynamic Virtual Tunnel Interface Easy VPN Server
Example: Verifying the Results for the IPsec Static Virtual Tunnel Interface
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
88
IPsec Virtual Tunnel Interfaces
Verifying the Results for the Dynamic Virtual Tunnel Interface Easy VPN Server Example
!
username cisco password 0 cisco123
!
controller ISA 1/1
!
crypto isakmp policy 1
encr aes
authentication pre-share
group 14
!
crypto isakmp client configuration group group1
key cisco123
pool group1pool
save-password
!
crypto isakmp profile vpn1-ra
match identity group group1
client authentication list local_list
isakmp authorization list local_list
client configuration address respond
virtual-template 1
!
crypto ipsec transform-set VTI-TS esp-aes esp-sha-hmac
!
crypto ipsec profile test-vti1
set transform-set VTI-TS
!
interface GigabitEthernet0/1
description Internet Connection
ip address 172.18.143.246 255.255.255.0
!
interface GigabitEthernet0/2
description Internal Network
ip address 10.2.1.1 255.255.255.0
!
interface Virtual-Template1 type tunnel
ip unnumbered GigabitEthernet0/1
ip virtual-reassembly
tunnel mode ipsec ipv4
tunnel protection ipsec profile test-vti1
!
ip local pool group1pool 192.168.1.1 192.168.1.4
ip classless
ip route 0.0.0.0 0.0.0.0 172.18.143.1
!
end
• Verifying the Results for the Dynamic Virtual Tunnel Interface Easy VPN Server Example,
page 89
Verifying the Results for the Dynamic Virtual Tunnel Interface Easy VPN Server Example
The following examples show that a DVTI has been configured for an Easy VPN server.
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
89
Example: Dynamic Virtual Tunnel Interface Easy VPN Client
Verifying the Results for the Dynamic Virtual Tunnel Interface Easy VPN Server Example
The client definition can be set up in many different ways. The mode specified with the connect command
can be automatic or manual. If the connect mode is set to manual, the IPsec tunnel has to be initiated
manually by a user.
Also note use of the mode command. The mode can be client, network-extension, or network-extension-
plus. This example indicates client mode, which means that the client is given a private address from the
server. Network-extension mode is different from client mode in that the client specifies for the server its
attached private subnet. Depending on the mode, the routing table on either end will be slightly different.
The basic operation of the IPSec tunnel remains the same, regardless of the specified mode.
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
90
Example: VRF-Aware IPsec with a Dynamic VTI When VRF is Configured Under a Virtual Template
Verifying the Results for the Dynamic Virtual Tunnel Interface Easy VPN Client Example
• Verifying the Results for the Dynamic Virtual Tunnel Interface Easy VPN Client Example,
page 91
Verifying the Results for the Dynamic Virtual Tunnel Interface Easy VPN Client Example
The following examples illustrate different ways to display the status of the DVTI.
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
91
Example: VRF-Aware IPsec with Dynamic VTI When VRF is Configured Under a Virtual Template with the Gateway
Option in an IPsec Profile
Verifying the Results for the Dynamic Virtual Tunnel Interface Easy VPN Client Example
!
!
crypto keyring cisco-100-1
pre-shared-key address 10.1.1.1 key cisco-100-1
crypto keyring cisco-100-2
pre-shared-key address 10.1.2.1 key cisco-100-2
crypto isakmp profile cisco-isakmp-profile-100-1
keyring cisco-100-1
match identity address 10.1.1.0 255.255.255.0
virtual-template 101
crypto isakmp profile cisco-isakmp-profile-100-2
keyring cisco-100-2
match identity address 10.1.2.0 255.255.255.0
virtual-template 102
!
!
crypto ipsec transform-set cisco esp-aes esp-sha-hmac
!
crypto ipsec profile cisco-ipsec-profile-101
set security-policy limit 3
set transform-set cisco
!
crypto ipsec profile cisco-ipsec-profile-102
set security-policy limit 5
set transform-set Cisco
!
interface Virtual-Template101 type tunnel
ip vrf forwarding VRF-100-1
ip unnumbered Ethernet 0/0
tunnel mode ipsec ipv4
tunnel protection ipsec profile cisco-ipsec-profile-101
!
interface Virtual-Template102 type tunnel
ip vrf forwarding VRF-100-2
ip unnumbered Ethernet 0/0
tunnel mode ipsec ipv4
tunnel protection ipsec profile cisco-ipsec-profile-102
!
hostname c7206
!
ip vrf VRF-100-1
rd 1:1
!
ip vrf VRF-100-2
rd 1:1
!
!
!
crypto keyring cisco-100-1
pre-shared-key address 10.1.1.1 key cisco-100-1
crypto keyring cisco-100-2
pre-shared-key address 10.1.2.1 key cisco-100-2
crypto isakmp profile cisco-isakmp-profile-100-1
keyring cisco-100-1
match identity address 10.1.1.0 255.255.255.0
virtual-template 101
crypto isakmp profile cisco-isakmp-profile-100-2
keyring cisco-100-2
match identity address 10.1.2.0 255.255.255.0
virtual-template 102
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
92
Example: VRF-Aware IPsec with a Dynamic VTI When VRF is Configured Under an ISAKMP Profile
Verifying the Results for the Dynamic Virtual Tunnel Interface Easy VPN Client Example
!
!
crypto ipsec transform-set cisco esp-aes esp-sha-hmac
!
crypto ipsec profile cisco-ipsec-profile-101
set security-policy limit 3
set transform-set cisco
set reverse-route gateway 50.0.0.1
!
crypto ipsec profile cisco-ipsec-profile-102
set security-policy limit 5
set transform-set cisco
set reverse-route gateway 50.0.0.1
!
interface Virtual-Template101 type tunnel
ip vrf forwarding VRF-100-1
ip unnumbered Ethernet 0/0
tunnel mode ipsec ipv4
tunnel protection ipsec profile cisco-ipsec-profile-101
!
interface Virtual-Template102 type tunnel
ip vrf forwarding VRF-100-2
ip unnumbered Ethernet 0/0
tunnel mode ipsec ipv4
tunnel protection ipsec profile cisco-ipsec-profile-102
!
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
93
Example: VRF-Aware IPsec with a Dynamic VTI When VRF is Configured Under an ISAKMP Profile and a Gateway
Option in an IPsec Profile
Verifying the Results for the Dynamic Virtual Tunnel Interface Easy VPN Client Example
Note When separate VRFs are configured under an ISAKMP profile and a virtual template, the VRF configured
under the virtual template takes precedence. This configuration is not recommended.
The following example shows how to configure VRF-aware IPsec to take advantage of the DVTI when the
VRF is configured under both a virtual template and an ISAKMP profile:
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
94
Example: Configuring Multi-SA Support for Dynamic VTI Using IKEv2
Verifying the Results for the Dynamic Virtual Tunnel Interface Easy VPN Client Example
rd 1:2
route-target export 1:1
route-target import 1:1
!
.
.
.
ip vrf test-vti1
rd 1:1
route-target export 1:1
route-target import 1:1
!
.
.
.
crypto isakmp profile cisco-isakmp-profile
vrf test-vti2
keyring key
match identity address 10.1.1.0 255.255.255.0
!
.
.
.
interface Virtual-Template1 type tunnel
ip vrf forwarding test-vti1
ip unnumbered Loopback0
ip virtual-reassembly
tunnel mode ipsec ipv4
tunnel protection ipsec profile test-vti1
!
.
.
.
end
!
!
aaa new-model
!
!
aaa authorization network grp-list local
!
aaa attribute list aaa-cisco-ikev2-profile-100-1
attribute type interface-config "ip vrf forwarding VRF-100-1"
attribute type interface-config "ip unnumbered Ethernet0/0"
!
aaa attribute list aaa-cisco-ikev2-profile-100-2
attribute type interface-config "ip vrf forwarding VRF-100-2"
attribute type interface-config "ip unnumbered Ethernet0/0"
!
aaa attribute list aaa-cisco-ikev2-profile-100-3
attribute type interface-config "ip vrf forwarding VRF-100-3"
attribute type interface-config "ip unnumbered Ethernet0/0"
!
!
!
!
!
aaa session-id common
!
ip vrf VRF-100-1
rd 101:1
route-target export 101:1
route-target import 101:1
!
ip vrf VRF-100-2
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
95
IPsec Virtual Tunnel Interfaces
Verifying the Results for the Dynamic Virtual Tunnel Interface Easy VPN Client Example
rd 102:2
route-target export 102:2
route-target import 102:2
!
ip vrf VRF-100-3
rd 103:3
route-target export 103:3
route-target import 103:3
!
!
!
crypto ikev2 authorization policy auth-policy-cisco-ikev2-profile-100-1
aaa attribute list aaa-cisco-ikev2-profile-100-1
ipsec flow-limit 3
!
crypto ikev2 authorization policy auth-policy-cisco-ikev2-profile-100-2
aaa attribute list aaa-cisco-ikev2-profile-100-2
ipsec flow-limit 3
!
crypto ikev2 authorization policy auth-policy-cisco-ikev2-profile-100-3
aaa attribute list aaa-cisco-ikev2-profile-100-3
ipsec flow-limit 3
!
crypto ikev2 proposal ikev2-proposal
encryption aes
integrity sha
group 14
!
crypto ikev2 policy ikev2-policy
match fvrf any
proposal ikev2-proposal
!
crypto ikev2 keyring cisco-ikev2
peer cisco-100-1
address 100.1.1.1
pre-shared-key cisco-100-1
!
peer cisco-100-2
address 100.1.2.1
pre-shared-key cisco-100-2
!
peer cisco-100-3
address 100.1.3.1
pre-shared-key cisco-100-3
!
!
!
crypto ikev2 profile cisco-ikev2-profile-100-1
match fvrf any
match identity remote address 10.1.1.1 255.255.255.255
authentication local pre-share
authentication remote pre-share
keyring cisco-ikev2
aaa authorization group grp-list auth-policy-cisco-ikev2-profile-100-1
virtual-template 1
!
crypto ikev2 profile cisco-ikev2-profile-100-2
match fvrf any
match identity remote address 10.1.2.1 255.255.255.255
authentication local pre-share
authentication remote pre-share
keyring cisco-ikev2
aaa authorization group group-list auth-policy-cisco-ikev2-profile-100-2
virtual-template 1
!
crypto ikev2 profile cisco-ikev2-profile-100-3
match fvrf any
match identity remote address 10.1.3.1 255.255.255.255
authentication local pre-share
authentication remote pre-share
keyring cisco-ikev2
aaa authorization group group-list auth-policy-cisco-ikev2-profile-100-3
virtual-template 1
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
96
Example: Dynamic Virtual Tunnel Interface with Virtual Firewall
Verifying the Results for the Dynamic Virtual Tunnel Interface Easy VPN Client Example
!
!
crypto ipsec transform-set cisco esp-aes esp-sha-hmac
!
crypto ipsec profile cisco-ipsec-profile
set transform-set cisco
set reverse-route distance 10
set reverse-route tag 321
interface Virtual-Template1 type tunnel
ip unnumbered Ethernet0/0
tunnel mode ipsec ipv4
tunnel protection ipsec profile cisco-ipsec-profile
!
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
97
Example: Dynamic Virtual Tunnel Interface with QoS
Verifying the Results for the Dynamic Virtual Tunnel Interface Easy VPN Client Example
!
end
Example: Dynamic Virtual Tunnel Interface Using GRE with IPsec Protection
Router1(config)# crypto ipsec transform-set MyTransformSet esp-aes esp-sha-hmac
Router1(cfg-crypto-trans)# mode transport
Router1(cfg-crypto-trans)# exit
Router1# config terminal
Router1(config)# crypto ipsec profile MyProfile set transform-set MyTransformSet
Router1(config)# interface Tunnel1
Router1(config-if)# description to-3800
Router1(config-if)# ip address 172.29.0.137 255.255.255.252
Router1(config-if)# tunnel source Ethernet0/0
Router1(config-if)# tunnel destination 10.38.38.1
Router1(config-if)# tunnel protection ipsec profile MyProfile
The show interface tunnel command verifies the tunnel interface configuration.
Note The tunnel transport MTU accounts for IPsec encryption overhead with GRE when used with the above
configuration.
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
98
IPsec Virtual Tunnel Interfaces
Additional References
Additional References
Related Documents
Standard/RFC Title
RFC 2401 Security Architecture for the Internet Protocol
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
99
IPsec Virtual Tunnel Interfaces
Feature Information for IPsec Virtual Tunnel Interfaces
Standard/RFC Title
RFC 2409 The Internet Key Exchange (IKE)
Technical Assistance
Description Link
The Cisco Support and Documentation website http://www.cisco.com/cisco/web/support/
provides online resources to download index.html
documentation, software, and tools. Use these
resources to install and configure the software and
to troubleshoot and resolve technical issues with
Cisco products and technologies. Access to most
tools on the Cisco Support and Documentation
website requires a Cisco.com user ID and
password.
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
100
IPsec Virtual Tunnel Interfaces
Multi-SA for Dynamic VTIs 15.2(1)T The DVTI can accept multiple
IPsec selectors that are proposed
by the initiator.
The following commands were
introduced or modified: set
security-policy limit, set
reverse-route.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S.
and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks.
Third-party trademarks mentioned are the property of their respective owners. The use of the word partner
does not imply a partnership relationship between Cisco and any other company. (1110R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be
actual addresses and phone numbers. Any examples, command display output, network topology diagrams,
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
101
IPsec Virtual Tunnel Interfaces
and other figures included in the document are shown for illustrative purposes only. Any use of actual IP
addresses or phone numbers in illustrative content is unintentional and coincidental.
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
102
L2TP IPsec Support for NAT and PAT Windows
Clients
The L2TP IPsec Support for NAT and PAT Windows Clients feature allows mulitple Windows client to
connect to an IPsec-enabled Cisco IOS Layer 2 Tunneling Protocol (L2TP) Network Server (LNS)
through a network address translation (NAT) or port address translation (PAT) server.
When a Windows client connects to an IPsec-enabled Cisco IOS LNS router through a NAT or PAT
server and another Windows client connects to the same Cisco IOS LNS router, the first client’s
connection is terminated. The L2TP IPsec Support for NAT and PAT Windows Clients feature ensures
that Windows client connections in this environment are established and maintained until the connection
is closed.
Note Security threats, as well as the cryptographic technologies to help protect against them, are constantly
changing. For more information about the latest Cisco cryptographic recommendations, see the Next
Generation Encryption (NGE) white paper.
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
103
How L2TP IPsec Support for NAT and PAT Windows Clients Works
Prerequisites for L2TP IPsec Support for NAT and PAT Windows Clients
How L2TP IPsec Support for NAT and PAT Windows Clients Works
When a Windows client connects to an IPsec-enabled Cisco IOS LNS router through a NAT or PAT server
and another Windows client connects to the same Cisco IOS LNS router, the first client's connection is
terminated.
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
104
L2TP IPsec Support for NAT and PAT Windows Clients
Information About L2TP IPsec Support for NAT and PAT Windows Clients
Note If IPsec is not enabled or there is no NAT or PAT server, multiple Windows clients can connect to the
Cisco IOS LNS router.
L2TP IPsec Support for NAT and PAT Windows Clients Feature not Enabled
The figure below shows two Windows 2000 clients that are trying to connect to an end host through a
router running NAT or PAT and IPsec-enabled Cisco IOS LNS router.
Figure 11 Multiple Windows 2000 Clients, NAT Router, and Cisco IOS LNS Router
The Windows 2000 Client #1 establishes an IPsec-protected L2TP tunnel to the Cisco IOS LNS router. The
Windows 2000 Client #1 and the Cisco IOS LNS router recognize that there is a NAT router located
between them and the NAT router is enabled with IPsec and NAT-Traversal (NAT-T). The Windows 2000
Client #1 attempts to establish an IPsec security association (SA) and requests a transport mode (which it
does by default) with proxies from 10.0.0.2, its local address, to 209.265.200.231, the Cisco IOS LNS
router’s address.
In transport mode, NAT, running on the router, translates all outgoing connections (including 10.0.0.2) to
its outside IP address (209.265.200.232), at which the address the traffic arrives. However, NAT cannot
modify the L2TP port designation (1701), which is protected by the IPsec encrypted area. So, the local
address now is 209.265.200.231, the remote address the 209.265.200.232 and the remote port is 1701. The
traffic that matches the tunnel 209.265.200.231, port 1701 is sent to the Windows 2000 Client #1.
Windows 2000 Client #2 establishes an IPsec-protected L2TP tunnel to the Cisco IOS LNS router and
NAT translates outgoing connections to its outside IP address (209.265.200.232) again, NAT cannot
modify the L2TP port designation (1701) similar to Windows Client #1. The traffic that matches tunnel
209.265.200.231, port 1701 is now sent to Windows 2000 Client #2. which ends Windows Client #1’s
connection with the Cisco IOS LNS router since it is no longer receiving traffic.
L2TP IPsec Support for NAT and PAT Windows Clients Feature Enabled
When the L2TP IPsec Support for NAT and PAT Windows Clients feature is enabled, IPsec can translate
the L2TP ports after decryption. This feature allows IPsec to map traffic from different hosts to different
source ports. L2TP can now distinguish between traffic destined for multiple Windows 2000 clients.
When an security association (SA) is created, a translated port is assigned to the SA. This port is client-
specific. The same port is used for any new SA created by that client. When an encrypted request is
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
105
Enabling L2TP IPsec Support
How to Enable L2TP IPsec Support for NAT and PAT Windows Clients
received and decrypted, the source port is translated from the standard value 1701 to a client specific value.
The request with the translated port is then forwarded to L2TP.
As shown in the above figure, with port address translation enabled, the Windows 2000 Client #1 is
assigned to the translated port number 1024, and Windows 2000 Client #2 is assigned to the translated port
number 1025.
When L2TP sends the reply packet, it uses the translated port number and creates a packet to that
destination port. IPsec uses the destination port number to select the SA with which to encrypt the packet.
Before encrypting the packet, IPsec translates the destination port back to the standard port number 1701,
which the Windows 2000 client expects. IPsec encrypts the packet either with the SA to Windows 2000
Client #1 if the destination port is 1024 or with the SA to Windows 2000 Client #2 if the destination port is
1025. The traffic is now sent to the appropriate client, and multiple Windows clients can be connected to a
Cisco IOS LNS router through a NAT server at the same time.
The connection is maintained until one of the following actions occurs:
• The IPsec connection is closed.
• The NAT or PAT router ends the session.
• The Cisco IOS LNS router closes the session.
• A Windows client closes the session.
How to Enable L2TP IPsec Support for NAT and PAT Windows
Clients
• Enabling L2TP IPsec Support, page 106
1. enable
2. configure terminal
3. Do one of the following:
• crypto map map-name seq-num [ipsec-isakmp]
• crypto dynamic-map dynamic-map-name dynamic-seq-num
4. set nat demux
5. end
6. Do one of the following:
• show crypto map [interface interface | tag map-name]
• show crypto dynamic-map [tag map-name]
7. show crypto ipsec sa
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
106
L2TP IPsec Support for NAT and PAT Windows Clients
How to Enable L2TP IPsec Support for NAT and PAT Windows Clients
DETAILED STEPS
Example:
Router# configure terminal
Step 3 Do one of the following: Creates a static crypto map entry and enters crypto
map configuration mode.
• crypto map map-name seq-num [ipsec-isakmp]
• crypto dynamic-map dynamic-map-name dynamic-seq-num or
Creates a dynamic crypto map entry and enters crypto
map configuration mode.
Example:
Router(config)# crypto map static map 5
Example:
Router(config)# crypto dynamic-map dynamic-map 10
Example:
Router(config-crypto-map)# set nat demux
Example:
Router(config-crypto-map)# end
Step 6 Do one of the following: (Optional) Displays the crypto map configuration
information.
• show crypto map [interface interface | tag map-name]
• show crypto dynamic-map [tag map-name] or
(Optional) Displays the dynamic crypto map
configuration information.
Example:
Router# show crypto map
Example:
Router# show crypto dynamic-map 10
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
107
Example: Dynamic Map Configuration
Configuration Examples for L2TP IPsec Support for NAT and PAT Windows Clients
Example:
Router# show crypto ipsec sa
version 12.3
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname 72_LNS
!
boot-start-marker
boot-end-marker
!
aaa new-model
!
!
aaa authentication ppp default local
aaa session-id common
ip subnet-zero
!
!
no ip cef
no ip domain lookup
ip domain name cisco.com
ip dhcp excluded-address 198.51.100.1
ip dhcp excluded-address 198.51.100.10
!
!
ip vrf VPN
rd 1:1
!
! Enable virtual private networking.
vpdn enable
vpdn ip udp ignore checksum
!
! Default L2TP VPDN group
vpdn-group L2TP
!
! Enables the LNS to accept dial in requests; specifies L2TP as the tunneling
! protocol; specifies the number of the virtual templates used to clone
! virtual-access interfaces.
accept-dialin
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
108
L2TP IPsec Support for NAT and PAT Windows Clients
Configuration Examples for L2TP IPsec Support for NAT and PAT Windows Clients
protocol l2tp
virtual-template 1
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
109
L2TP IPsec Support for NAT and PAT Windows Clients
Additional References
control-plane
!
gatekeeper
shutdown!
!
line con 0
exec-timeout 0 0
logging synchronous
stopbits 1
line aux 0
stopbits 1
line vty 0 4
!
end
Additional References
Related Documents
Security commands: complete command syntax, • Cisco IOS Security Command Reference
command mode, command history, defaults, usage Commands A to C
guidelines, and examples
• Cisco IOS Security Command Reference
Commands D to L
• Cisco IOS Security Command Reference
Commands M to R
• Cisco IOS Security Command Reference
Commands S to Z
Technical Assistance
Description Link
The Cisco Support and Documentation website http://www.cisco.com/cisco/web/support/
provides online resources to download index.html
documentation, software, and tools. Use these
resources to install and configure the software and
to troubleshoot and resolve technical issues with
Cisco products and technologies. Access to most
tools on the Cisco Support and Documentation
website requires a Cisco.com user ID and
password.
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
110
L2TP IPsec Support for NAT and PAT Windows Clients
Feature Information for L2TP IPsec Support for NAT and PAT Windows Clients
Feature Information for L2TP IPsec Support for NAT and PAT
Windows Clients
The following table provides release information about the feature or features described in this module.
This table lists only the software release that introduced support for a given feature in a given software
release train. Unless noted otherwise, subsequent releases of that software release train also support that
feature.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support.
To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
Table 6 Feature Information for L2TP IPsec Support for NAT and PAT Windows Clients
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S.
and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks.
Third-party trademarks mentioned are the property of their respective owners. The use of the word partner
does not imply a partnership relationship between Cisco and any other company. (1110R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be
actual addresses and phone numbers. Any examples, command display output, network topology diagrams,
and other figures included in the document are shown for illustrative purposes only. Any use of actual IP
addresses or phone numbers in illustrative content is unintentional and coincidental.
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
111
Example: Dynamic Map Configuration
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
112
SafeNet IPsec VPN Client Support
The SafeNet IPsec VPN Client Support feature allows you to limit the scope of an Internet Security
Association and Key Management Protocol (ISAKMP) profile or ISAKMP keyring configuration to a
local termination address or interface. The benefit of this feature is that different customers can use the
same peer identities and ISAKMP keys by using different local termination addresses.
Release Modification
12.3(14)T This feature was introduced.
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
113
ISAKMP Profile and ISAKMP Keyring Configurations Background
Restrictions for SafeNet IPsec VPN Client Support
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
114
Limiting an ISAKMP Profile to a Local Termination Address or Interface
How to Configure SafeNet IPsec VPN Client Support
SUMMARY STEPS
1. enable
2. configure terminal
3. crypto isakmp profile profile-name
4. keyring keyring-name
5. match identity address address
6. local-address {interface-name | ip-address [vrf-tag ]}
DETAILED STEPS
Router> enable
Example:
Step 3 crypto isakmp profile profile-name Defines an ISAKMP profile and enters ISAKMP profile
configuration mode.
Example:
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
115
Limiting a Keyring to a Local Termination Address or Interface
How to Configure SafeNet IPsec VPN Client Support
Step 5 match identity address address Matches an identity from a peer in an ISAKMP profile.
Example:
Step 6 local-address {interface-name | ip-address [vrf-tag ]} Limits the scope of an ISAKMP profile or an ISAKMP keyring
configuration to a local termination address or interface.
Example:
SUMMARY STEPS
1. enable
2. configure terminal
3. crypto keyring keyring-name
4. local-address {interface-name |ip-address[vrf-tag ]}
5. pre-shared-key address address
DETAILED STEPS
Router> enable
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
116
Monitoring and Maintaining SafeNet IPsec VPN Client Support
How to Configure SafeNet IPsec VPN Client Support
Example:
Step 3 crypto keyring keyring-name Defines a crypto keyring to be used during IKE
authentication and enters keyring configuration mode.
Example:
Step 4 local-address {interface-name |ip-address[vrf-tag ]} Limits the scope of an ISAKMP profile or an ISAKMP
keyring configuration to a local termination address or
interface.
Example:
Step 5 pre-shared-key address address Defines a preshared key to be used for IKE authentication.
Example:
SUMMARY STEPS
1. enable
2. debug crypto isakmp
3. show crypto isakmp profile
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
117
SafeNet IPsec VPN Client Support
Examples
DETAILED STEPS
Router> enable
Example:
Step 3 show crypto isakmp profile Lists all the ISAKMP profiles that are defined on a router.
Example:
Examples
• debug crypto isakmp Command Output for an ISAKMP Keyring That IsBound to Local Termination
Addresses Example, page 118
• debug crypto isakmp Command Output for an ISAKMP ProfileThat Is Boundto a Local Termination
Address Example, page 119
• show crypto isakmp profile Command Output Example, page 119
debug crypto isakmp Command Output for an ISAKMP Keyring That IsBound to Local Termination Addresses Example
You have an ISAKMP configuration as follows (the address of serial2/0 is 10.0.0.1, and the address of
serial2/1 is 10.0.0.2),
and if the connection is coming into serial2/0, keyring1 is chosen as the source of the preshared key (and
keyring2 is ignored because it is bound to serial2/1), you would see the following output:
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
118
Troubleshooting SafeNet IPsec VPN Client Support
debug crypto isakmp Command Output for an ISAKMP ProfileThat Is Boundto a Local Termination Address
Example
10.0.0.0, skipping
*Feb 11 15:01:29.595: ISAKMP:(0:0:N/A:0):Looking for a matching key for
10.0.0.3 in keyring1
*Feb 11 15:01:29.595: ISAKMP:(0:0:N/A:0): : success
*Feb 11 15:01:29.595: ISAKMP:(0:0:N/A:0):found peer pre-shared key
matching 10.0.0.3
*Feb 11 15:01:29.595: ISAKMP:(0:0:N/A:0): local preshared key found
debug crypto isakmp Command Output for an ISAKMP ProfileThat Is Boundto a Local Termination Address Example
If you have the following configuration,
and the connection is coming through the local terminal address serial2/0, you will see the following
output:
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
119
ISAKMP Profile Bound to a Local Interface Example
Additional References
local-address serial2/0
crypto keyring
local-address serial2/0
ip vrf examplevrf1
rd 12:3456
crypto keyring ring1
local-address 10.34.35.36 examplevrf1
interface ethernet2/0
ip vrf forwarding examplevrf1
ip address 10.34.35.36 255.255.0.0
Additional References
The following sections provide references related to SafeNet IPsec VPN Client Support.
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
120
Related DocumentsStandards
Additional References
Related DocumentsStandards
Related Topic Document Title
Configuring ISAKMP profiles and ISAKMP VRF-Aware IPsec
keyrings
Standard Title
No new or modified standards are supported by this --
feature.
MIBs
MIB MIBs Link
No new or modified MIBs are supported by this To locate and download MIBs for selected
feature. platforms, Cisco IOS software releases, and feature
sets, use Cisco MIB Locator found at the following
URL:
http://www.cisco.com/go/mibs
RFCs
RFC Title
No new or modified RFCs are supported by this --
feature.
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
121
Technical Assistance
Technical Assistance
Description Link
The Cisco Support website provides extensive http://www.cisco.com/techsupport
online resources, including documentation and tools
for troubleshooting and resolving technical issues
with Cisco products and technologies.
To receive security and technical information about
your products, you can subscribe to various
services, such as the Product Alert Tool (accessed
from Field Notices), the Cisco Technical Services
Newsletter, and Really Simple Syndication (RSS)
Feeds.
Access to most tools on the Cisco Support website
requires a Cisco.com user ID and password.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S.
and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks.
Third-party trademarks mentioned are the property of their respective owners. The use of the word partner
does not imply a partnership relationship between Cisco and any other company. (1110R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be
actual addresses and phone numbers. Any examples, command display output, network topology diagrams,
and other figures included in the document are shown for illustrative purposes only. Any use of actual IP
addresses or phone numbers in illustrative content is unintentional and coincidental.
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
122
Ability to Disable Extended Authentication for
Static IPsec Peers
The Ability to Disable Extended Authentication for Static IPsec Peers feature allows users to disable
extended authentication (Xauth), preventing the routers from being prompted for Xauth information--
username and password.
Feature Overview
Without the ability to disable Xauth, a user cannot select which peer on the same crypto map should use
Xauth. That is, if a user has router-to-router IP security (IPsec) on the same crypto map as a virtual private
network (VPN)-client-to-Cisco-IOS IPsec, both peers are prompted for a username and password. In
addition, a remote static peer (a Cisco IOS router) cannot establish an Internet Key Exchange (IKE)
security association (SA) with the local Cisco IOS router. (Xauth is not an optional exchange, so if a peer
does not respond to an Xauth request, the IKE SA is deleted.) Thus, the same interface cannot be used to
terminate IPsec to VPN clients (that need Xauth) as well as other Cisco IOS routers (that cannot respond to
Xauth) unless this feature is implemented.
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
123
Benefits
Supported Standards MIBs and RFCs
Benefits
If VPN-client-to-Cisco-IOS IPsec and router-to-router IPsec exist on a single interface, the Ability to
Disable Extended Authentication for Static IPsec Peers feature allows a user to disable Xauth while
configuring the preshared key for router-to-router IPsec. Thus, the router will not prompt the peer for a
username and password, which are transmitted when Xauth occurs for VPN-client-to-Cisco-IOS IPsec.
Restrictions
Xauth can be disabled only if preshared keys are used as the authentication mechanism for the given crypto
map.
Related Documents
• “Configuring Internet Key Exchange for IPsec VPNs” chapter in the Cisco IOS Security Configuration
Guide: Secure Connectivity
• “Configuring Security for VPNs with IPsec” chapter in the Cisco IOS Security Configuration Guide:
Secure Connectivity
• Cisco IOS Security Command Reference
MIBs
None
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB
Locator found at the following URL:
http://www.cisco.com/go/mibs
RFCs
No new or modified RFCs are supported by this feature.
Prerequisites
Before you can disable Xauth for static IPsec peers, you must complete the following tasks:
• Enable authentication, authorization, and accounting (AAA).
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
124
Disabling Xauth for Static IPsec Peers
Configuration Tasks
Note Configuring AAA is required only if the VPN-client-to-Cisco-IOS is using AAA authentication.
Configuration Tasks
See the following sections for configuration tasks for the Ability to Disable Extended Authentication for
Static IPsec Peers feature. Each task in the list is identified as either required or optional.
• Disabling Xauth for Static IPsec Peers, page 125
Command Purpose
Configures a preshared authentication key.
Router(config)# crypto isakmp key
keystring address peer-address [mask] [no- Use the no-xauth keyword if router-to-router IPsec
xauth]
is on the same crypto map as VPN-client-to-Cisco
IOS IPsec. This keyword prevents the router from
prompting the peer for Xauth information.
You must configure the local and remote peer for
preshared keys.
Note According to the design of preshared key
authentication in IKE main mode, preshared
keys must be based on the IP address of the
peers. Although you can send hostname as
the identity of preshared key authentication,
the key is searched on the IP address of the
peer; if the key is not found (based on the IP
address) the negotiation will fail.
Configuration Examples
• Disabling Xauth for Static IPsec Peers Configuration, page 126
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
125
Disabling Xauth for Static IPsec Peers Configuration
Feature Information for Ability to Disable Xauth for Static IPsec Peers
Table 7 Feature Information for Ability to Disable Xauth for Static IPsec Peers
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S.
and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks.
Third-party trademarks mentioned are the property of their respective owners. The use of the word partner
does not imply a partnership relationship between Cisco and any other company. (1110R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be
actual addresses and phone numbers. Any examples, command display output, network topology diagrams,
and other figures included in the document are shown for illustrative purposes only. Any use of actual IP
addresses or phone numbers in illustrative content is unintentional and coincidental.
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
126
Crypto Conditional Debug Support
The Crypto Conditional Debug Support feature introduces three new command-line interfaces (CLIs) that
allow users to debug an IP Security (IPSec) tunnel on the basis of predefined crypto conditions such as the
peer IP address, connection-ID of a crypto engine, and security parameter index (SPI). By limiting debug
messages to specific IPSec operations and reducing the amount of debug output, users can better
troubleshoot a router with a large number of tunnels.
Feature History
Release Modification
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
127
Supported Condition Types
Restrictions for Crypto Conditional Debug Support
1 If an IPSec connid, flowid, or SPI is used as a debug condition, the debug messages for a related IPSec flow are generated. An IPSec flow has two connids,
flowids, and SPIs--one inbound and one outbound. Both two connids, flowids, and SPIs can be used as the debug condition that triggers debug messages
for the IPSec flow.
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
128
Enabling Crypto Conditional Debug Messages
How to Enable Crypto Conditional Debug Support
Performance Considerations
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
129
Crypto Conditional Debug Support
Disable Crypto Debug Conditions
• Before enabling crypto conditional debugging, you must decide what debug condition types (also
known as debug filters) and values will be used. The volume of debug messages is dependent on the
number of conditions you define.
Note Specifying numerous debug conditions may consume CPU cycles and negatively affect router performance.
• Your router will perform conditional debugging only after at least one of the global crypto debug
commands--debug crypto isakmp, debug crypto ipsec, and debug crypto engine--has been enabled.
This requirement helps to ensure that the performance of the router will not be impacted when
conditional debugging is not being used.
Note The reset keyword can be used to disable all configured conditions at one time.
SUMMARY STEPS
1. enable
2. debug crypto condition [connidintegerengine-idinteger ] [flowidinteger engine-idinteger ] [fvrf
string] [ivrf string] [peer [group string] [hostname string] [ipv4 ipaddress] [subnet subnet mask]
[username string]] [spi integer] [reset]
3. show crypto debug-condition {[peer] [connid] [spi] [fvrf] [ivrf] [unmatched]}
4. debug crypto isakmp
5. debug crypto ipsec
6. debug crypto engine
7. debug crypto condition unmatched [isakmp | ipsec | engine]
DETAILED STEPS
Router> enable
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
130
Enabling Crypto Error Debug Messages
Disable Crypto Debug Conditions
Example:
Step 3 show crypto debug-condition {[peer] [connid] [spi] [fvrf] [ivrf] Displays crypto debug conditions that have
[unmatched]} already been enabled in the router.
Example:
Example:
Router#
debug crypto isakmp
Example:
Router#
debug crypto ipsec
Example:
Router#
debug crypto engine
Step 7 debug crypto condition unmatched [isakmp | ipsec | engine] (Optional) Displays debug conditional crypto
messages when no context information is
available to check against debug conditions.
Example: If none of the optional keywords are specified,
Router# debug crypto condition unmatched ipsec all crypto-related information will be shown.
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
131
Enabling Crypto Conditional Debugging Example
debug crypto error CLI
Note When enabling this command, ensure that global crypto debug commands are not enabled; otherwise, the
global commands will override any possible error-related debug messages.
SUMMARY STEPS
1. enable
2. debug crypto {isakmp | ipsec | engine} error
DETAILED STEPS
Router> enable
Step 2 debug crypto {isakmp | ipsec | engine} error Enables only error debugging messages for a crypto area.
Example:
Router#
debug crypto condition connid 2000 engine-id 1
Router#
debug crypto condition peer ipv4 10.1.1.1
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
132
Disabling Crypto Conditional Debugging Example
Additional References
Router#
debug crypto condition peer ipv4 10.1.1.2
Router#
debug crypto condition peer ipv4 10.1.1.3
Router#
debug crypto condition unmatched
! Verify crypto conditional settings.
Router#
show crypto debug-condition
Crypto conditional debug currently is turned ON
IKE debug context unmatched flag:ON
IPsec debug context unmatched flag:ON
Crypto Engine debug context unmatched flag:ON
IKE peer IP address filters:
10.1.1.1 10.1.1.2 10.1.1.3
Connection-id filters:[connid:engine_id]2000:1,
! Enable global crypto CLIs to start conditional debugging.
Router#
debug crypto isakmp
Router#
debug crypto ipsec
Router#
debug crypto engine
Router#
debug crypto condition reset
! Verify that all crypto conditional settings have been disabled.
Router#
show crypto debug-condition
Crypto conditional debug currently is turned OFF
IKE debug context unmatched flag:OFF
IPsec debug context unmatched flag:OFF
Crypto Engine debug context unmatched flag:OFF
Additional References
The following sections provide references to the Crypto Conditional Debug Support feature.
Related Documents
Standards
Standards Title
None --
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
133
Crypto Conditional Debug Support
MIBs
RFCs
RFCs Title
None --
Technical Assistance
Description Link
Technical Assistance Center (TAC) home page, http://www.cisco.com/techsupport
containing 30,000 pages of searchable technical
content, including links to products, technologies,
solutions, technical tips, and tools. Registered
Cisco.com users can log in from this page to access
even more content.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S.
and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks.
Third-party trademarks mentioned are the property of their respective owners. The use of the word partner
does not imply a partnership relationship between Cisco and any other company. (1110R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be
actual addresses and phone numbers. Any examples, command display output, network topology diagrams,
and other figures included in the document are shown for illustrative purposes only. Any use of actual IP
addresses or phone numbers in illustrative content is unintentional and coincidental.
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
134
VPN Acceleration Module
This feature module describes the VPN Acceleration Module (VAM) feature
Prerequisites
You must configure IPSec and IKE on the router and a crypto map to all interfaces that require encryption
service from the VAM. See the Configuration Examples for VPN Acceleration, page 148 for
configuration procedures.
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
135
Feature Information
Information about VPN Acceleration
Feature Information
Feature History
Release Modification
12.1(9)E This feature was introduced on the Cisco 7200
series routers on NPE-225, NPE-400, and NSE-1
Feature Overview
The VPN Acceleration Module (VAM) is a single-width acceleration module. It provides high-
performance, hardware-assisted tunneling and encryption services suitable for Virtual Private Network
(VPN) remote access, site-to-site intranet, and extranet applications. It also provides platform scalability
and security while working with all services necessary for successful VPN deployments -- security, quality
of service (QoS), firewall and intrusion detection, service-level validation, and management. The VAM off-
loads IPSec processing from the main processor, thus freeing resources on the processor engines for other
tasks.
The VAM provides hardware-accelerated support for the following multiple encryption functions:
• 56-bit Data Encryption Standard (DES) standard mode: Cipher Block Chaining (CBC)
• 3-Key Triple DES (168-bit)
• Secure Hash Algorithm (SHA)-1 and Message Digest 5 (MD5)
• Rivest, Shamir, Adelman (RSA) public-key algorithm
• Diffie-Hellman key exchange RC4-40
The following commands are introduced or modified in the feature or features
• show pas vam interface
2 Support for dual VAMs is available on a Cisco 7200 series router with NPE-G1 on Cisco IOS Release 12.2(15)T, 12.1(14)E, and 12.3 Mainline only.
3 The Cisco 7401ASR router is no longer sold.
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
136
Benefits
Information about VPN Acceleration
Benefits
The VAM provides the following benefits:
• 10 tunnels per second
• The following number of tunnels based on the corresponding memory of the NPE:
◦ 800 tunnels for 64 MB
◦ 1600 tunnels for 128 MB
◦ 3200 tunnels for 256 MB
◦ 5000 tunnels for 512 MB
• RSA encryption
• Accelerated Crypto performance
• Accelerated Internet Key Exchange (IKE)
• Certificate support for automatic authentication using digital certificates
• Dual VAM support
Note Support for dual VAMs is available on a Cisco 7200 series router with an NPE-G1, on Cisco IOS Release
12.2(15)T, 12.1(14)E, and 12.3 Mainline.
• Encryption services to any port adapter installed in the router. The interface on the port adapter must
be configured with a crypto map to support IPSec.
• Full-duplex data transmission of over 100 Mbps with various encryption and compression schemes for
300 byte packages
• Hardware-based IPPCP LZS compression
• Network traffic compression that reduces bandwidth utilization
• Online Insertion and Removal (OIR)
• QoS, multiprotocol, and multicast feature interoperation
• Support for full Layer 3 routing, such as Enhanced Interior Gateway Routing Protocol (EIGRP), Open
Shortest Path First (OSPF), and Border Gateway Protocol (BGP) across the IPSec VPN
• Up to 145 Mbps throughput using 3DES
• VPN initialization improvements
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
137
VPN Acceleration Module
Information about VPN Acceleration
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
138
Related Features and Technologies
Information about VPN Acceleration
Related Documents
The following document describes the VAM hardware:
• VPN Acceleration Module Installation and Configuration
Supported Platforms
The VAM feature is supported on the following platforms:
• Cisco 7200 series routers with NPE-225, NPE-400, NSE-1, and NPE-G1
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
139
Supported Standards MIBs and RFCs
How To Configure VPN Acceleration
• Dual VAM support is available on a Cisco 7200 series router with an NPE-G1, on Cisco IOS Release
12.2(15)T, 12.1(14)E, and 12.3M.
• Cisco 7401ASR router
MIBs
The following MIBs were introduced or modified in this feature:
• CISCO-IPSEC-FLOW-MONITOR-MIB
• CISCO-IPSEC-MIB
• CISCO-IPSEC-POLICY-MAP-MIB
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB
Locator found at the following URL:
http://www.cisco.com/go/mibs
RFCs
• IPPCP: RFC 2393, 2395
• IPSec/IKE: RFCs 2401-2411, 2451
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
140
VPN Acceleration Module
How To Configure VPN Acceleration
SUMMARY STEPS
DETAILED STEPS
Step 3 Router(config-isakmp)# (Optional) Specifies the authentication method within an IKE policy.
authentication {rsa-sig |
• rsa-sig --Specifies Rivest, Shamir, and Adelman (RSA) signatures as the
rsa-encr | pre-share}
authentication method.
• rsa-encr --Specifies RSA encrypted nonces as the authentication method.
Note Beginning with Cisco IOS Release 12.3(10), rsa-encr is now enabled for VAM
crypto cards.
Step 4 Router(config-isakmp)# (Optional) Specifies the lifetime of an IKE security association (SA).
lifetimeseconds seconds--Number of seconds that each SA should exist before expiring. Use an integer
from 60 to 86,400 seconds.
Note If this command is not enabled, the default value (86,400 seconds [one day]) will be
used.
Step 5 Router(config-isakmp)# (Optional) Specifies the hash algorithm within an IKE policy.
hash {sha | md5}
• sha --Specifies SHA-1 (HMAC variant) as the hash algorithm.
• md5 --Specifies MD5 (HMAC variant) as the hash algorithm.
Note If this command is not enabled, the default value (sha) will be used.
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
141
Configuring IPSec
Creating Crypto Access Lists
For detailed information on creating IKE policies, refer to the “ Configuring Internet Key Exchange for
IPsec VPNsmodule in the Cisco IOS Security Configuration Guide: Secure Connectivity .
Configuring IPSec
After you have completed IKE configuration, configure IPSec at each participating IPSec peer. This section
contains basic steps to configure IPSec and includes the tasks discussed in the following sections:
SUMMARY STEPS
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
142
VPN Acceleration Module
Defining Transform Sets
DETAILED STEPS
Step 2 Add permit and deny statements as appropriate. Adds permit or deny statements to access lists.
Command Purpose
Defines a transform set and enters crypto transform
Router# crypto ipsec transform-set transform- configuration mode.
set-name transform1 [transform2
[transform3]]
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
143
VPN Acceleration Module
Creating Crypto Map Entries using IKE
Command Purpose
Clears existing IPSec security associations so that
Router# clear crypto sa any changes to a transform set take effect on
or subsequently established security associations
(SAs). (Manually established SAs are reestablished
immediately.)
clear crypto sa peer {ip-
address | peer-name} Using the clear crypto sa command without
parameters clears out the full SA database, which
or
clears out active security sessions. You might also
specify the peer, map, or entry keywords to clear
clear crypto sa map map- out only a subset of the SA database.
name
or
Command Purpose
Creates the crypto map and enters crypto map
Router# crypto map map-name seq-num ipsec- configuration mode.
isakmp
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
144
VPN Acceleration Module
Verifying the Configuration
SUMMARY STEPS
1. Enter the show crypto ipsec transform-set command to view your transform set configuration:
2. Enter the show crypto map [interface interface | tag map-name] command to view your crypto map
configuration:
3. Enter the show crypto ipsec sa [map map-name | address | identity | detail | interface] command to
view information about IPSec security associations.
DETAILED STEPS
Step 1 Enter the show crypto ipsec transform-set command to view your transform set configuration:
Example:
Example:
outer# show crypto mapCrypto Map: “router-alice” idb: Ethernet0 local address: 172.21.114.123
Crypto Map “router-alice” 10 ipsec-isakmp
Peer = 172.21.114.67
Extended IP access list 141
access-list 141 permit ip
source: addr = 172.21.114.123/0.0.0.0
dest: addr = 172.21.114.67/0.0.0.0
Current peer: 172.21.114.67
Security-association lifetime: 4608000 kilobytes/120 seconds
PFS (Y/N): N
Transform sets={t1,}
Step 3 Enter the show crypto ipsec sa [map map-name | address | identity | detail | interface] command to view
information about IPSec security associations.
Example:
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
145
Troubleshooting Tips
Verifying the Configuration
Troubleshooting Tips
To verify that Cisco IOS software has recognized VAM, enter the show diag command and check the
output. For example, when the router has the VAM in slot 1, the following output appears:
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
146
Monitoring and Maintaining the VPN Acceleration Module
Verifying the Configuration
To see if the VAM is currently processing crypto packets, enter the show pas vam interface command.
The following is sample output:
When the VAM processes packets, the “packet in” and “packet out” counters change. Counter “packets
out” represents the number of packets directed to the VAM. Counter “packets in” represents the number of
packets received from the VAM.
Note In versions prior to Cisco IOS Release 12.2(5)T and Cisco IOS Release 12.1(10)E, upon reboot trap
configurations are lost and need to be re-entered.
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
147
Configuring IKE Policies Example
Configuration Examples for VPN Acceleration
Command Purpose
Displays the ISA interface configuration.
Router# show pas isa interface
A transform set defines how the traffic will be protected. In this example, transform set "myset1" uses DES
encryption and SHA for data packet authentication:
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
148
VPN Acceleration Module
Glossary
Another transform set example is "myset2," which uses Triple DES encryption and MD5 (HMAC variant)
for data packet authentication:
A crypto map joins together the IPSec access list and transform set and specifies where the protected traffic
is sent (the remote IPSec peer):
interface Serial0
ip address 10.0.0.2
crypto map toRemoteSite
Glossary
VAM --VPN Acceleration Module.
IKE --Internet Key Exchange. IKE establishes a shared security policy and authenticates keys for services
(such as IPSec) that require keys. Before any IPSec traffic can be passed, each router/firewall/host must
verify the identity of its peer. This can be done by manually entering preshared keys into both hosts or by a
CA service.
IPSec --IP Security. A framework of open standards that provides data confidentiality, data integrity, and
data authentication between participating peers. IPSec provides these security services at the IP layer.
IPSec uses IKE to handle the negotiation of protocols and algorithms based on local policy and to generate
the encryption and authentication keys to be used by IPSec. IPSec can protect one or more data flows
between a pair of hosts, between a pair of security gateways, or between a security gateway and a host.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S.
and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks.
Third-party trademarks mentioned are the property of their respective owners. The use of the word partner
does not imply a partnership relationship between Cisco and any other company. (1110R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be
actual addresses and phone numbers. Any examples, command display output, network topology diagrams,
and other figures included in the document are shown for illustrative purposes only. Any use of actual IP
addresses or phone numbers in illustrative content is unintentional and coincidental.
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
149
Configuring IPSec Configuration Example
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
150
Option to Disable Hardware Crypto
EngineFailover to Software Crypto Engine
The Option to Disable Hardware Crypto Engine Failover to Software Crypto Engine feature gives you the
option of configurirng your router so that failover to the software crypto engine does not occur even if the
hardware crypto engine fails.
Note Security threats, as well as the cryptographic technologies to help protect against them, are constantly
changing. For more information about the latest Cisco cryptographic recommendations, see the Next
Generation Encryption (NGE) white paper.
Feature History for Option to Disable Hardware Crypto Engine Failover to Software Crypto Engine
Release Modification
12.3(14)T This feature was introduced.
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
151
Hardware Crypto Engine Failover to the Software Crypto Engine Overview
Prerequisites for Option to Disable Hardware Crypto Engine Failover to Software Crypto Engine
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
152
Disabled Hardware Crypto Engine Failover Example
Configuration Examples for Option to Disable Hardware Crypto Engine Failover to Software Crypto Engine
SUMMARY STEPS
1. enable
2. configure terminal
3. no crypto engine software ipsec
DETAILED STEPS
Router> enable
Example:
Step 3 no crypto engine software ipsec Disables hardware crypto engine failover to the software crypto
engine.
• To reenable failover, use the crypto engine software ipsec
Example:
form of this command.
Router (config)# no crypto engine software
ipsec
version 12.4
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname VPN-Gateway1
!
boot-start-marker
boot-end-marker
!
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
153
Option to Disable Hardware Crypto EngineFailover to Software Crypto Engine
Additional References
!
clock timezone EST 0
no aaa new-model
ip subnet-zero
!
!
ip audit po max-events 100
no ftp-server write-enable
!
!
no crypto engine software ipsec
!
crypto isakmp policy 10
encr aes
authentication pre-share
group 14
crypto isakmp key cisco123 address 209.165.201.2!
!
crypto ipsec transform-set basic esp-aes esp-sha-hmac
crypto map mymap 10 ipsec-isakmp
set peer 209.165.201.2
set transform-set basic
match address 101
!
!
interface Ethernet0/0
ip address 192.168.1.1 255.255.255.0
!
interface Serial1/0
ip address 209.165.200.2 255.255.255.252
serial restart-delay 0
crypto map mymap!
ip classless
ip route 0.0.0.0 0.0.0.0 209.165.200.1
no ip http server
no ip http secure-server
!
!
access-list 101 permit ip 192.168.1.0 0.0.0.255 172.16.2.0 0.0.0.255 access-list 101
remark Crypto ACL!
!
!
control-plane
!
!
line con 0
line aux 0
line vty 0 4
!
!
end
Additional References
The following sections provide references related to Option to Disable Hardware Crypto Engine Failover to
Software Crypto Engine.
Related Documents
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
154
Option to Disable Hardware Crypto EngineFailover to Software Crypto Engine
Standards
Standards Title
No new or modified standards are supported by this —
feature, and support for existing standards has not
been modified by this feature.
MIBs
RFCs
RFCs Title
No new or modified RFCs are supported by this —
feature, and support for existing RFCs has not been
modified by this feature.
Technical Assistance
Description Link
The Cisco Support website provides extensive http://www.cisco.com/techsupport
online resources, including documentation and tools
for troubleshooting and resolving technical issues
with Cisco products and technologies.
To receive security and technical information about
your products, you can subscribe to various
services, such as the Product Alert Tool (accessed
from Field Notices), the Cisco Technical Services
Newsletter, and Really Simple Syndication (RSS)
Feeds.
Access to most tools on the Cisco Support website
requires a Cisco.com user ID and password.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S.
and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks.
Third-party trademarks mentioned are the property of their respective owners. The use of the word partner
does not imply a partnership relationship between Cisco and any other company. (1110R)
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
155
Option to Disable Hardware Crypto EngineFailover to Software Crypto Engine
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be
actual addresses and phone numbers. Any examples, command display output, network topology diagrams,
and other figures included in the document are shown for illustrative purposes only. Any use of actual IP
addresses or phone numbers in illustrative content is unintentional and coincidental.
Security for VPNs with IPsec Configuration Guide Cisco IOS Release 15.2MT
156