Guys,

Can someone explain to me why is this working?

I have got an IPSEC tunnel between R1 and R7 using hostname as IKE ID.
Because I'm using hostname as ID  I'm forced to use Aggressive mode which
is fine.
What I don't understand is how it is possible that the PSK is matched based
on the IKE ID (hostname) when in the configuration on the receiving router
doesn't have anything to match that specific IKE ID. There is no dns server
or  local ip host configured on the routers.

I can change the user-fqdn to any random string and  the tunnel still comes
up.

Thanks!

R7

crypto isakmp policy 10
 encr 3des
 authentication pre-share
 group 2

crypto isakmp identity hostname
crypto isakmp peer address 8.9.11.1
 set aggressive-mode password cisco
 set aggressive-mode client-endpoint user-fqdn R7

crypto ipsec transform-set ESP3DES esp-3des esp-sha-hmac
crypto map VPN 10 ipsec-isakmp
 set peer 8.9.11.1
 set transform-set ESP3DES
 match address l2l

R1

crypto isakmp policy 10
 encr 3des
 authentication pre-share
 group 2

crypto isakmp identity hostname
crypto isakmp peer address 8.9.11.7
 set aggressive-mode password cisco
 set aggressive-mode client-endpoint user-fqdn R1

crypto ipsec transform-set ESP3DES esp-3des esp-sha-hmac
crypto map VPN 10 ipsec-isakmp
 set peer 8.9.11.7
 set transform-set ESP3DES
 match address l2l
 crypto map VPN




R1 (receiving side)  debug output:

*Jun 14 13:22:49.619: ISAKMP: local port 500, remote port 500
*Jun 14 13:22:49.619: ISAKMP:(0):insert sa successfully sa = 6705E8E8
*Jun 14 13:22:49.619: ISAKMP:(0): processing SA payload. message ID = 0
*Jun 14 13:22:49.619: ISAKMP:(0): processing ID payload. message ID = 0
*Jun 14 13:22:49.619: ISAKMP (0): ID payload
        next-payload : 13
        type         : 3
*        USER FQDN    : R7 *
        protocol     : 17
        port         : 0
        length       : 10
*Jun 14 13:22:49.619: ISAKMP:(0):: peer matches *none* of the profiles
*Jun 14 13:22:49.619: ISAKMP:(0): processing vendor id payload
...
**Jun 14 13:22:49.623: ISAKMP:(0):SA using tunnel password as pre-shared
key.*
*Jun 14 13:22:49.623: ISAKMP:(0): local preshared key found
*Jun 14 13:22:49.623: ISAKMP : Scanning profiles for xauth ...
*Jun 14 13:22:49.623: ISAKMP:(0):Checking ISAKMP transform 1 against
priority 10 policy
*Jun 14 13:22:49.623: ISAKMP:      encryption 3DES-CBC
*Jun 14 13:22:49.623: ISAKMP:      hash SHA
*Jun 14 13:22:49.623: ISAKMP:      default group 2
*Jun 14 13:22:49.623: ISAKMP:      auth pre-share
*Jun 14 13:22:49.623: ISAKMP:      life type in seconds
*Jun 14 13:22:49.623: ISAKMP:      life duration (VPI) of  0x0 0x1 0x51
0x80
*Jun 14 13:22:49.623: ISAKMP:(0):atts are acceptable. Next payload is 0
....

**Jun 14 13:22:49.699: ISAKMP:(1003):SA is doing pre-shared key
authentication using id type ID_FQDN*
*Jun 14 13:22:49.699: ISAKMP (1003): ID payload
        next-payload : 10
        type         : 2
        FQDN name    : R1
        protocol     : 0
        port         : 0
        length       : 10
*Jun 14 13:22:49.699: ISAKMP:(1003):Total payload length: 10
*Jun 14 13:22:49.699: ISAKMP:(1003): sending packet to 8.9.11.7 my_port 500
peer_port 500 (R) AG_INIT_EXCH
*Jun 14 13:22:49.699: ISAKMP:(1003):Sending an IKE IPv4 Packet.
*Jun 14 13:22:49.699: ISAKMP:(1003):Input = IKE_MESG_FROM_PEER, IKE_AM_EXCH
*Jun 14 13:22:49.699: ISAKMP:(1003):Old State = IKE_READY  New State =
IKE_R_AM2



R1#sh crypto isakmp peers 8.9.11.7
Peer: 8.9.11.7 Port: 500 Local: 8.9.11.1
* Phase1 id: R7*
_______________________________________________
For more information regarding industry leading CCIE Lab training, please visit 
www.ipexpert.com

Are you a CCNP or CCIE and looking for a job? Check out 
www.PlatinumPlacement.com

Reply via email to