Hey all,
Thanks for the feedback on previous show crypto outputs. I have been
configuring GETVPN and studying the show crypto outputs and as usual its
thrown up a couple of things that I need to ask
The basic layout of my GETVPN network is:
R1 (KS)
-----------------inside--ASA--outside-----------------------------R3---------------------------R2
R2 and R3 are the GETVPN Groups Members.
Config on the KS is as follows:
ip access-list ext GETVPN-TRAFFIC
permit ip 192.168.0.0 0.0.255.255 192.168.0.0 0.0.255.255
crypto key generate rsa general-key modulus 1024 label GETVPN export
crypto isakmp policy 23
auth pre
encr 3des
hash md5
crypto isakmp key CISCO address 0.0.0.0
crypto ipsec transform-set 3DESMD5 esp-3des esp-md5-hmac
crypto ipsec profile GETVPN-IPSECPROF
set transform-set 3DESMD5
crypto gdoi group GETVPN123
identity number 123
server local
rekey lifetime seconds 300
rekey retransmit 10 number 2
rekey authentication mypubkey rsa GETVPN
rekey transport unicast
sa ipsec 123
profile GETVPN-IPSECPROF
match address ipv4 GETVPN-TRAFFIC
replay counter window-size 64
address ipv4 1.1.1.1
crypto map GDOI local-address Loopback0
crypto map GDOI 10 gdoi
set group GETVPN123
interface FastEthernet0/0.10
ip address 10.100.10.1 255.255.255.0
crypto map GDOI
interface Loopback0
ip address 1.1.1.1 255.255.255.0
Show crypto output from Router R2
CCIELAB-ROUTER-R2#show crypto isakmp sa
IPv4 Crypto ISAKMP SA
dst src state conn-id slot
status
1.1.1.1 2.2.2.2 GDOI_IDLE 1011 0 ACTIVE
2.2.2.2 1.1.1.1 GDOI_REKEY 1014 0 ACTIVE
2.2.2.2 1.1.1.1 GDOI_REKEY 1013 0 ACTIVE
CCIELAB-ROUTER-R2#show crypto gdoi
GROUP INFORMATION
Group Name : GETVPN123
Group Identity : 123
Rekeys received : 8
IPSec SA Direction : Both
Active Group Server : 1.1.1.1
Group Server list : 1.1.1.1
GM Reregisters in : 3385 secs
Rekey Received(hh:mm:ss) : 00:02:29
Rekeys received
Cumulative : 8
After registration : 2
Rekey Acks sent : 8
ACL Downloaded From KS 1.1.1.1:
access-list permit ip 192.168.0.0 0.0.255.255 192.168.0.0 0.0.255.255
KEK POLICY:
Rekey Transport Type : Unicast
Lifetime (secs) : 300
Encrypt Algorithm : 3DES
Key Size : 192
*Sig Hash Algorithm : HMAC_AUTH_SHA*
Sig Key Length (bits) : 1024
TEK POLICY:
FastEthernet0/0.23:
IPsec SA:
sa direction:inbound
spi: 0xC14AA712(3242895122)
transform: esp-3des esp-md5-hmac
sa timing:remaining key lifetime (sec): (1441)
Anti-Replay : Disabled
IPsec SA:
sa direction:outbound
spi: 0xC14AA712(3242895122)
transform: esp-3des esp-md5-hmac
sa timing:remaining key lifetime (sec): (1441)
Anti-Replay : Disabled
In the above "show crypto gdoi" output from the group member, why is it that
under the KEK POLICY, the Sig Hash Algorithm is showing "HMAC_AUTH_SHA" ? I
dont have SHA configured anywhere. In my ISAKMP and IPsec policies I
configured MD5. Has the SHA got anything to do with the crypto key I
generated with the label "GETVPN" or has it got something to do with the
"crypto gdoi group" configuration. Or both ?
I also see reference to SHA when I run the "show crypto engine connection
active" on both the GM and KS. I dont have any other ISAKMP policies
configured on either routers, so I'm confused with where the SHA is coming
from.
CCIELAB-ROUTER-R2#show crypto engin conn active
Crypto Engine Connections
ID Type Algorithm Encrypt Decrypt IP-Address
1011 IKE MD5+3DES 0 0 2.2.2.2
1015 IKE SHA+3DES 0 0
1016 IKE SHA+3DES 0 0
2027 IPsec 3DES+MD5 0 5 192.168.0.0
2028 IPsec 3DES+MD5 5 0 192.168.0.0
2029 IPsec 3DES+MD5 0 0 0.0.0.0
2030 IPsec 3DES+MD5 0 0 0.0.0.0
2031 IPsec 3DES+MD5 0 0 192.168.0.0
2032 IPsec 3DES+MD5 0 0 192.168.0.0
2033 IPsec 3DES+MD5 0 0 192.168.0.0
2034 IPsec 3DES+MD5 0 0 192.168.0.0
2035 IPsec 3DES+MD5 0 0 0.0.0.0
2036 IPsec 3DES+MD5 0 0 0.0.0.0
2037 IPsec 3DES+MD5 0 0 192.168.0.0
2038 IPsec 3DES+MD5 0 0 192.168.0.0
2055 IPsec 3DES+MD5 0 0 192.168.0.0
2056 IPsec 3DES+MD5 0 0 192.168.0.0
CCIELAB-ROUTER-R1#show crypto engin conn active
Crypto Engine Connections
ID Type Algorithm Encrypt Decrypt IP-Address
1010 IKE MD5+3DES 0 0 1.1.1.1
1011 IKE MD5+3DES 0 0 1.1.1.1
1015 IKE SHA+3DES 0 0
And "show crypto ipsec sa" from the GM router R2
local ident (addr/mask/prot/port): (192.168.0.0/255.255.0.0/0/0)
remote ident (addr/mask/prot/port): (192.168.0.0/255.255.0.0/0/0)
current_peer 0.0.0.0 port 848
PERMIT, flags={origin_is_acl,}
#pkts encaps: 15, #pkts encrypt: 15, #pkts digest: 15
#pkts decaps: 15, #pkts decrypt: 15, #pkts verify: 15
#pkts compressed: 0, #pkts decompressed: 0
#pkts not compressed: 0, #pkts compr. failed: 0
#pkts not decompressed: 0, #pkts decompress failed: 0
#send errors 0, #recv errors 0
local crypto endpt.: 2.2.2.2, remote crypto endpt.: 0.0.0.0
path mtu 1500, ip mtu 1500, ip mtu idb FastEthernet0/0.23
current outbound spi: 0xC14AA712(3242895122)
inbound esp sas:
spi: 0xC14AA712(3242895122)
transform: *esp-3des esp-md5-hmac* ,
in use settings ={Tunnel, }
*conn id: 2027*, flow_id: NETGX:27, crypto map: GDOI
sa timing: remaining key lifetime (sec): (176)
IV size: 8 bytes
replay detection support: Y
Status: ACTIVE
spi: 0x5100880C(1358989324)
transform: esp-3des esp-md5-hmac ,
in use settings ={Tunnel, }
conn id: 2033, flow_id: NETGX:33, crypto map: GDOI
sa timing: remaining key lifetime (sec): (1811)
IV size: 8 bytes
replay detection support: Y
Status: ACTIVE
spi: 0x895F95E(144046430)
transform: esp-3des esp-md5-hmac ,
in use settings ={Tunnel, }
conn id: 2055, flow_id: NETGX:55, crypto map: GDOI
sa timing: remaining key lifetime (sec): (2184)
IV size: 8 bytes
replay detection support: Y
Status: ACTIVE
outbound esp sas:
spi: 0xC14AA712(3242895122)
transform: *esp-3des esp-md5-hmac* ,
in use settings ={Tunnel, }
*conn id: 2028*, flow_id: NETGX:28, crypto map: GDOI
sa timing: remaining key lifetime (sec): (176)
IV size: 8 bytes
replay detection support: Y
Status: ACTIVE
spi: 0x5100880C(1358989324)
transform:* esp-3des esp-md5-hmac *,
in use settings ={Tunnel, }
*conn id: 2034*, flow_id: NETGX:34, crypto map: GDOI
sa timing: remaining key lifetime (sec): (1811)
IV size: 8 bytes
replay detection support: Y
Status: ACTIVE
spi: 0x895F95E(144046430)
transform: *esp-3des esp-md5-hmac *,
in use settings ={Tunnel, }
*conn id: 2056*, flow_id: NETGX:56, crypto map: GDOI
sa timing: remaining key lifetime (sec): (2184)
IV size: 8 bytes
replay detection support: Y
Status: ACTIVE
Appreciate any ideas on this
Thanks
Mark
_______________________________________________
For more information regarding industry leading CCIE Lab training, please visit
www.ipexpert.com
Are you a CCNP or CCIE and looking for a job? Check out
www.PlatinumPlacement.com