Pre shared key length error

Тема создана 2 сентября 2010 и уже 1189 ответов

<link rel=»stylesheet» type=»text/css» href=»style.css»>

<script language=»JavaScript»>

var interval = 55;

var intervalid;

function doWEPChange() {

if (document.WLAN.WEP_Selection.selectedIndex == 0)

{

alert(«Please select one authentication type first!»);return;

}

IPIgnoreWhenChange();

document.WLAN.wlanWEPFlag.value = 1;

document.WLAN.wlanRadiusWEPFlag.value = 0;

document.WLAN.submit();

}

function doRadiusWepChange()

{

IPIgnoreWhenChange();

document.WLAN.wlanWEPFlag.value = 1;

document.WLAN.wlanRadiusWEPFlag.value = 1;

document.WLAN.submit();

}

function doSSIDChange() {

IPIgnoreWhenChange();

document.WLAN.wlanWEPFlag.value = 2;

document.WLAN.submit();

}

function IPIgnoreWhenChange()

{

}

function doMultiSSIDChange(form){

if (form.wlan_MBSSIDenable[0].checked)

{

form.BssidNumIndex.disabled = false;

}

else

{

form.BssidNumIndex.disabled = true;

}

}

function doMBSSIDSwitch(onoff)

{

if( ((onoff==0) && (document.WLAN.MBSSIDSwitchFlag.value==1))

||( (onoff==1) && (document.WLAN.MBSSIDSwitchFlag.value==0)))

{

ConfirmRestart();

}

}

function doMBSSIDNumberSwitch(number)

{

if((number!=0)&&(document.WLAN.MBSSIDSwitchFlag.value!=0)){

if(number!=document.WLAN.MBSSIDSwitchFlag.value)

{

ConfirmRestart2();

}

}

}

function doMBSSIDNumSwitch()

{

//document.WLAN.submit();

//redirect();

return;

}

function ConfirmRestart2()

{

if(confirm(«The CPE will reboot if you enable/disable multi bssid function,do you want to continue?»)){

document.WLAN.submit();

redirect();

return;

}

else {

if(document.WLAN.MBSSIDSwitchFlag.value==2)

{

document.WLAN.wlan_MBSSIDNumber[0].checked = true;

document.WLAN.wlan_MBSSIDNumber[1].checked = false;

document.WLAN.wlan_MBSSIDNumber[2].checked = false;

}

else if(document.WLAN.MBSSIDSwitchFlag.value==3){

document.WLAN.wlan_MBSSIDNumber[0].checked = false;

document.WLAN.wlan_MBSSIDNumber[1].checked = true;

document.WLAN.wlan_MBSSIDNumber[2].checked = false;

}

else if(document.WLAN.MBSSIDSwitchFlag.value==4){

document.WLAN.wlan_MBSSIDNumber[0].checked = false;

document.WLAN.wlan_MBSSIDNumber[1].checked = false;

document.WLAN.wlan_MBSSIDNumber[2].checked = true;

}

}

}

function ConfirmRestart()

{

if(confirm(«The CPE will reboot if you enable/disable multi bssid function,do you want to continue?»)){

document.WLAN.submit();

redirect();

return;

}

else {

if (document.WLAN.MBSSIDSwitchFlag.value==1)

{

document.WLAN.wlan_MBSSIDenable[0].checked = true;

document.WLAN.wlan_MBSSIDenable[1].checked = false;

}

else

{

document.WLAN.wlan_MBSSIDenable[1].checked = true;

document.WLAN.wlan_MBSSIDenable[0].checked = false;

}

}

}

function redirect()

{

intervalid = setInterval( «GetPage()»,interval*1000 );

}

function GetPage()

{

window.location.href = «home_wlan.html»;

clearInterval(intervalid);

}

function WEPKeyCheck(object)

{

var bf128bit = 8;

var keyValue = object.value;

var len = keyValue.length;

var c1 = keyValue.charAt(0);

var c2 = keyValue.charAt(1);

var c3 = keyValue.charAt(2);

if(document.WLAN.WEP_Selection.selectedIndex == 1){

bf128bit = 0;

}

else {

if(document.WLAN.WEP_Selection.selectedIndex == 2){

bf128bit = 1;

}

else {

bf128bit=8;

}

}

if ( len == 0 )

{

object.value =»»;

return;

}

if ( bf128bit == 1 )

{

/* 128-bit WEP */

if ( (len != 13) && (len != 26) )

{

alert(‘Please enter exactly 13 characters or 26 hexadecimal digits («0-9», «A-F»;) for a 128-bit WEP encryption Key.’);return;

}

}

else if ( bf128bit == 0 )

{

if ( (len != 5) && (len != 10) )

{

alert(‘Please enter exactly 5 characters or 10 hexadecimal digits («0-9», «A-F»;) for a 64-bit WEP encryption Key.’);return;

}

}

return;

}

function wpapskCheck() {

var keyValue=document.forms[0].PreSharedKey.value;

var wpapsklen = keyValue.length;

if(wpapsklen < 8) {

alert(‘Pre-Shared Key length error!’);return true;

}

if(wpapsklen==64){

for ( i = 0; i < 64; i++ )

{

var c = keyValue.charAt(i);

if ( doHexCheck(c) < 0 )

{

alert(«Pre-Shared Key’s Hex Value Error!»);return true;

}

}

}

else if(wpapsklen>64)

{

alert(«Maximum ASCII String Length is 63!»);return true;

}

return false;

}

function doHexCheck(c)

{

if ( (c >= «0»;) && (c <= «9»;) )

return 1;

else if ( (c >= «A»;) && (c <= «F»;) )

return 1;

else if ( (c >= «a»;) && (c <= «f»;) )

return 1;

return -1;

}

function doMACcheck(object)

{

var szAddr = object.value;

var len = szAddr.length;

if ( len == 0 )

{

object.value =»00:00:00:00:00:00″;

return;

}

if ( len == 12 )

{

var newAddr = «»;

var i = 0;

for ( i = 0; i < len; i++ )

{

var c = szAddr.charAt(i);

if ( doHexCheck(c) < 0 )

{

alert(«Invalid MAC Address»);// object.value =»00:00:00:00:00:00″;

object.focus();

return;

}

if ( (i == 2) || (i == 4) || (i == 6) || (i == 8) || (i == 10) )

newAddr = newAddr + «:»;

newAddr = newAddr + c;

}

object.value = newAddr;

return;

}

else if ( len == 17 )

{

var i = 2;

var c0 = szAddr.charAt(0);

var c1 = szAddr.charAt(1);

if ( (doHexCheck(c0) < 0) || (doHexCheck(c1) < 0) )

{

alert(«Invalid MAC Address»);// object.value =»00:00:00:00:00:00″;

object.focus();

return;

}

i = 2;

while ( i < len )

{

var c0 = szAddr.charAt(i);

var c1 = szAddr.charAt(i+1);

var c2 = szAddr.charAt(i+2);

if ( (c0 != «:»;) || (doHexCheck(c1) < 0) || (doHexCheck(c2) < 0) )

{

alert(«Invalid MAC Address»);// object.value =»00:00:00:00:00:00″;

object.focus();

return;

}

i = i + 3;

}

return;

}

else

{

alert(«Invalid MAC Address»);// object.value =»00:00:00:00:00:00″;

object.focus();

return;

}

}

function isNumeric(s)

{

var len= s.length;

var ch;

if(len==0)

return false;

for( i=0; i< len; i++)

{

ch= s.charAt(i);

if( ch > ‘9’ || ch < ‘0’)

{

return false;

}

}

return true;

}

function wdskeyCheck() {

if(document.forms[0].WDSKey.value.length < 8) {

return true;

}

return false;

}

function checkBeacon(value)

{

if (!isNumeric(value)) {

alert(«Non-integer value given » + value);return true;

}

if (value < 20 || value > 1000) {

alert(«Beacon value must be between 20 and 1000»);return true;

}

return false;

}

function checkRTS(value)

{

if (!isNumeric(value)) {

alert(«Non-integer value given » + value);return true;

}

if (value < 1500 || value > 2347) {

alert(«RTS Threshold value must be between 1500 and 2347»);return true;

}

return false;

}

function checkFrag(value)

{

if (!isNumeric(value)) {

alert(«Non-integer value given » + value);return true;

}

if (value < 256 || value > 2346) {

alert(«Fragmentation Threshold value must be between 256 and 2346»);return true;

}

if (value % 2) {

alert(«Fragmentation Threshold value must be an even number»);return true;

}

return false;

}

function checkDTIM(value)

{

if (!isNumeric(value)) {

alert(«Non-integer value given » + value);return true;

}

if (value < 1 || value > 255) {

alert(«DTIM value must be between 1 and 255»);return true;

}

return false;

}

function strESSIDCheck(str) {

if(str.value.match(/[^x00-xff]/g)){

alert(«Invalid SSID!»);return true;

}

return false;

}

function doSave() {

if (document.WLAN.WEP_Selection.selectedIndex == 0)

{

alert(«Please select one authentication type first!»);return;

}

if (checkBeacon(document.forms[0].BeaconInterval.value) ||

checkRTS(document.forms[0].RTSThreshold.value) ||
checkFrag(document.forms[0].FragmentThreshold.value) ||
checkDTIM(document.forms[0].DTIM.value)
)
return;
if (document.WLAN.WEP_Selection.selectedIndex == 3) {
if (wpapskCheck())
return;
}
if (strESSIDCheck(document.WLAN.ESSID))
return;
if (document.WLAN.WEP_Selection.selectedIndex == 1||document.WLAN.WEP_Selection.selectedIndex == 2
|| document.WLAN.WEP_Selection.selectedIndex == 6
)
{
var keyValue1 = document.WLAN.WEP_Key1.value;
var keyValue2 = document.WLAN.WEP_Key2.value;
var keyValue3 = document.WLAN.WEP_Key3.value;
var keyValue4 = document.WLAN.WEP_Key4.value;
var lenArr = [keyValue1.length, keyValue2.length, keyValue3.length, keyValue4.length];
for(i=0; i<4; i++)
{
if((document.WLAN.DefWEPKey[i].checked == true) && (lenArr[i] == 0))
{
alert(«WEP KEY should not be empty!»);return;
}
}
}
document.WLAN.wlanWEPFlag.value = 3;
document.WLAN.submit();
}
function doLoad() {
document.WLAN.WEP_Selection.options[0].text=
«Authentication Type List»}
// —>
</script>
</head><body class=mainbody onLoad=»doLoad()»>
<FORM METHOD=»POST» ACTION=»/Forms/home_wlan_1″ name=»WLAN»><table width=»550″ >
<tr>
<td class=pagetitle>
Wireless Lan</td></tr><tr>
<TD class=tabletitle></td></tr><tr>
<TD height=»20″ style=»border-right-style:none; border-left-style:none;»>&nbsp;</td></tr></table><table cellpadding=»0″ cellspacing=»0″ border=»0″ width=»550″>
<tr>
<td class=»tableheader» style=»BORDER-RIGHT-STYLE: none» colspan=4>
Wireless Setting</td></tr><tr>
<td class=»tablerowheader» colspan=2>
Access Point</td><td class=»tablerowvalue» colspan=2>
<INPUT TYPE=»RADIO» NAME=»wlan_APenable» VALUE=»1″ CHECKED>Enable&nbsp;&nbsp;<INPUT TYPE=»RADIO» NAME=»wlan_APenable» VALUE=»0″>Disable</td></tr><tr>
<td class=»tablerowheader» colspan=2>
Channel ID</td><td class=»tablerowvalue» colspan=2>
<SELECT NAME=»Countries_Channels» SIZE=»1″ onChange=»document.WLAN.CountryChange.value = 1; document.WLAN.submit();»><OPTION>ALBANIA
<OPTION>ALGERIA
<OPTION>ARGENTINA
<OPTION>ARMENIA
<OPTION>AUSTRALIA
<OPTION>AUSTRIA
<OPTION>AZERBAIJAN
<OPTION>BAHRAIN
<OPTION SELECTED>BELARUS
<OPTION>BELGIUM
<OPTION>BELIZE
<OPTION>BOLIVIA
<OPTION>BRAZIL
<OPTION>BRUNEI
<OPTION>BULGARIA
<OPTION>CANADA
<OPTION>CHILE
<OPTION>CHINA
<OPTION>COLOMBIA
<OPTION>COSTA RICA
<OPTION>CROATIA
<OPTION>CYPRUS
<OPTION>CZECH REPUBLIC
<OPTION>DENMARK
<OPTION>DOMINICAN REPUBLIC
<OPTION>ECUADOR
<OPTION>EGYPT
<OPTION>EL SALVADOR
<OPTION>ESTONIA
<OPTION>FINLAND
<OPTION>FRANCE
<OPTION>GEORGIA
<OPTION>GERMANY
<OPTION>GREECE
<OPTION>GUATEMALA
<OPTION>HONDURAS
<OPTION>CHINA HONGKONG
<OPTION>HUNGARY
<OPTION>ICELAND
<OPTION>INDIA
<OPTION>INDONESIA
<OPTION>IRAN
<OPTION>IRELAND
<OPTION>ISRAEL
<OPTION>ITALY
<OPTION>JAPAN
<OPTION>JORDAN
<OPTION>KAZAKHSTAN
<OPTION>NORTH KOREA
<OPTION>KOREA REPUBLIC
<OPTION>KUWAIT
<OPTION>LATVIA
<OPTION>LEBANON
<OPTION>LIECHTENSTEIN
<OPTION>LITHUANIA
<OPTION>LUXEMBOURG
<OPTION>CHINA MACAO
<OPTION>MACEDONIA
<OPTION>MALAYSIA
<OPTION>MEXICO
<OPTION>MONACO
<OPTION>MOROCCO
<OPTION>NETHERLANDS
<OPTION>NEW ZEALAND
<OPTION>NORWAY
<OPTION>OMAN
<OPTION>PAKISTAN
<OPTION>PANAMA
<OPTION>PERU
<OPTION>PHILIPPINES
<OPTION>POLAND
<OPTION>PORTUGAL
<OPTION>PUERTO RICO
<OPTION>QATAR
<OPTION>ROMANIA
<OPTION>RUSSIA
<OPTION>SAUDI ARABIA
<OPTION>SINGAPORE
<OPTION>SLOVAKIA
<OPTION>SLOVENIA
<OPTION>SOUTH AFRICA
<OPTION>SPAIN
<OPTION>SWEDEN
<OPTION>SWITZERLAND
<OPTION>SYRIA ARAB REPUBLIC
<OPTION>CHINA TAIWAN
<OPTION>THAILAND
<OPTION>TRINIDAD AND TOBAGO
<OPTION>TUNISIA
<OPTION>TURKEY
<OPTION>UKRAINE
<OPTION>UNITED ARAB EMIRATES
<OPTION>UNITED KINGDOM
<OPTION>UNITED STATES
<OPTION>URUGUAY
<OPTION>UZBEKISTAN
<OPTION>VENEZUELA
<OPTION>VIETNAM
<OPTION>YEMEN
<OPTION>ZIMBABWE
<OPTION>Undefined
</SELECT><br><SELECT NAME=»Channel_ID» SIZE=»1″><OPTION VALUE=00000000>Auto Channel Select
<OPTION VALUE=00000001>Channel01 2412MHz
<OPTION VALUE=00000002>Channel02 2417MHz
<OPTION VALUE=00000003>Channel03 2422MHz
<OPTION VALUE=00000004>Channel04 2427MHz
<OPTION VALUE=00000005>Channel05 2432MHz
<OPTION VALUE=00000006>Channel06 2437MHz
<OPTION VALUE=00000007>Channel07 2442MHz
<OPTION VALUE=00000008>Channel08 2447MHz
<OPTION VALUE=00000009>Channel09 2452MHz
<OPTION VALUE=0000000a>Channel10 2457MHz
<OPTION VALUE=0000000b>Channel11 2462MHz
</SELECT>Current Channel:<INPUT TYPE=»TEXT» NAME=»CurrentChannel» SIZE=»3″ MAXLENGTH=»2″ VALUE=»6″ disabled><br>(If you select Auto Channel Select, it need to reboot CPE after submitting settings!)</td></tr><tr>
<td class=»tablerowheader» colspan=2>
SSID Number</td><td class=»tablerowvalue» colspan=2>
<INPUT TYPE=»RADIO» NAME=»wlan_MBSSIDNumber» VALUE=»2″ CHECKED onClick=» doMBSSIDNumberSwitch(2);»>2&nbsp;&nbsp;<INPUT TYPE=»RADIO» NAME=»wlan_MBSSIDNumber» VALUE=»3″ onClick=» doMBSSIDNumberSwitch(3);»>3&nbsp;&nbsp;<INPUT TYPE=»RADIO» NAME=»wlan_MBSSIDNumber» VALUE=»4″ onClick=» doMBSSIDNumberSwitch(4);»>4</td></tr><tr>
<td class=»tablerowheader» colspan=2>
SSID Index</td><td class=»tablerowvalue» colspan=2>
<SELECT NAME=»WLSSIDIndex» SIZE=»1″ onchange=»doSSIDChange();»><OPTION SELECTED>2
</SELECT></td></tr><tr>
<td class=»tablerowheader» colspan=2 >
SSID</td><td class=»tablerowvalue» colspan=2>
<INPUT TYPE=»TEXT» NAME=»ESSID» SIZE=»30″ MAXLENGTH=»32″ VALUE=»s_home» class=»tableinputvalue»></td></tr><tr>
<td class=»tablerowheader» colspan=2>
Broadcast SSID</td><td class=»tablerowvalue» colspan=2>
<INPUT TYPE=»RADIO» NAME=»ESSID_HIDE_Selection» VALUE=»0″ CHECKED>Yes&nbsp;&nbsp;<INPUT TYPE=»RADIO» NAME=»ESSID_HIDE_Selection» VALUE=»1″>No</td></tr><tr>
<td class=»tablerowheader» colspan=2>
Switch SSID</td><td class=»tablerowvalue» colspan=2>
<INPUT TYPE=»RADIO» NAME=»ESSID_Switch_Selection» VALUE=»0″ CHECKED>On&nbsp;&nbsp;&nbsp;<INPUT TYPE=»RADIO» NAME=»ESSID_Switch_Selection» VALUE=»1″>Off</td></tr><tr>
<td class=»tablerowheader» colspan=2>
Authentication Type</td><td class=»tablerowvalue» colspan=2>
<SELECT NAME=»WEP_Selection» SIZE=»1″ onChange=»doWEPChange()»><OPTION>OpenSystem
<OPTION>WEP-64Bits
<OPTION>WEP-128Bits
<OPTION>WPA-PSK
<OPTION>WPA2-PSK
<OPTION SELECTED>WPA-PSK/WPA2-PSK
</SELECT><INPUT TYPE=»HIDDEN» NAME=»wlanWEPFlag» VALUE=»0″></td></tr><tr>
<td class=»tableheader» style=»BORDER-RIGHT-STYLE: none» colspan=4>
WPA-PSK/WPA2-PSK</td></tr><tr>
<td class=»tablerowheader» colspan=2>
Encryption</td><td class=»tablerowvalue» colspan=2>
<SELECT NAME=»TKIP_Selection4″ SIZE=»1″><OPTION VALUE=00000000 SELECTED>TKIP
<OPTION VALUE=00000001>AES
<OPTION VALUE=00000002>TKIP/AES
</SELECT></td></tr><tr>
<td class=»tablerowheader» colspan=2>
Pre-Shared Key</td><td class=»tablerowvalue» colspan=2>
<INPUT TYPE=»TEXT» NAME=»PreSharedKey» SIZE=»48″ MAXLENGTH=»64″ VALUE=»296464990″ class=»tableinputvalue» onBlur=»wpapskCheck();»>(8~63 ASCII characters,or 64 Hex string)</td></tr><tr>
<td class=»tableheader» style=»BORDER-RIGHT-STYLE: none» colspan=4>
Advanced Setting</td></tr><tr>
<td class=»tablerowheader» colspan=2>
Beacon Interval</td><td class=»tablerowvalue» colspan=2>
<INPUT TYPE=»TEXT» NAME=»BeaconInterval» SIZE=»7″ MAXLENGTH=»4″ VALUE=»100″ class=»tableinputvalue» onChange=»checkBeacon(this.value);»></td></tr><tr>
<td class=»tablerowheader»colspan=2 >
RTS/CTS Threshold</td><td class=»tablerowvalue» colspan=2>
<INPUT TYPE=»TEXT» NAME=»RTSThreshold» SIZE=»7″ MAXLENGTH=»5″ VALUE=»2347″ class=»tableinputvalue» onChange=»checkRTS(this.value);»></td></tr><tr>
<td class=»tablerowheader» colspan=2>
Fragmentation Threshold</td><td class=»tablerowvalue» colspan=2>
<INPUT TYPE=»TEXT» NAME=»FragmentThreshold» SIZE=»7″ MAXLENGTH=»5″ VALUE=»2346″ class=»tableinputvalue» onChange=»checkFrag(this.value);»></td></tr><tr>
<td class=»tablerowheader» colspan=2>
DTIM</td><td class=»tablerowvalue» colspan=2>
<INPUT TYPE=»TEXT» NAME=»DTIM» SIZE=»7″ MAXLENGTH=»5″ VALUE=»1″ class=»tableinputvalue» onChange=»checkDTIM(this.value);»></td></tr><tr>
<td class=»tablerowheader» colspan=2>
802.11 b/g</td><td class=»tablerowvalue» colspan=2>
<SELECT NAME=»WirelessMode» SIZE=»1″><OPTION>802.11b
<OPTION>802.11g
<OPTION SELECTED>802.11b+g
</SELECT></td></tr><tr>
<td class=»tableheader» style=»BORDER-RIGHT-STYLE: none» colspan=4>
Wireless MAC Address Filter</td></tr><tr>
<td class=»tablerowheader» colspan=2>
Active</td><td class=»tablerowvalue» colspan=2>
<INPUT TYPE=»RADIO» NAME=»WLAN_FltActive» VALUE=»1″ CHECKED>Enable&nbsp;&nbsp;<INPUT TYPE=»RADIO» NAME=»WLAN_FltActive» VALUE=»0″>Disable</td></tr><tr>
<td class=»tablerowheader» colspan=2>
Action</td><td class=»tablerowvalue» colspan=2>
<SELECT NAME=»WLAN_FltAction» SIZE=»1″><OPTION VALUE=00000000 SELECTED>Allow Association
<OPTION VALUE=00000001>Deny Association
</SELECT></td></tr><tr>
<td class=»tablerowheader» colspan=2>
#1</td>
<td class=»tablerowvalue» colspan=2>
<INPUT TYPE=»TEXT» NAME=»WLANFLT_MAC» SIZE=»20″ MAXLENGTH=»20″ VALUE=»c4:17:fe:c4:a4:b1″ class=»tableinputvalue» onBlur=»doMACcheck(this)»></td>
</tr>
<tr>
<td class=»tablerowheader» colspan=2>
#2</td>
<td class=»tablerowvalue» colspan=2>
<INPUT TYPE=»TEXT» NAME=»WLANFLT_MAC» SIZE=»20″ MAXLENGTH=»20″ VALUE=»d8:d3:85:16:f4:ef» class=»tableinputvalue» onBlur=»doMACcheck(this)»></td>
</tr>
<tr>
<td class=»tablerowheader» colspan=2>
#3</td>
<td class=»tablerowvalue» colspan=2>
<INPUT TYPE=»TEXT» NAME=»WLANFLT_MAC» SIZE=»20″ MAXLENGTH=»20″ VALUE=»00:00:00:00:00:00″ class=»tableinputvalue» onBlur=»doMACcheck(this)»></td>
</tr>
<tr>
<td class=»tablerowheader» colspan=2>
#4</td>
<td class=»tablerowvalue» colspan=2>
<INPUT TYPE=»TEXT» NAME=»WLANFLT_MAC» SIZE=»20″ MAXLENGTH=»20″ VALUE=»00:00:00:00:00:00″ class=»tableinputvalue» onBlur=»doMACcheck(this)»></td>
</tr>
<tr>
<td class=»tablerowheader» colspan=2>
#5</td>
<td class=»tablerowvalue» colspan=2>
<INPUT TYPE=»TEXT» NAME=»WLANFLT_MAC» SIZE=»20″ MAXLENGTH=»20″ VALUE=»00:00:00:00:00:00″ class=»tableinputvalue» onBlur=»doMACcheck(this)»></td>
</tr>
<tr>
<td class=»tablerowheader» colspan=2>
#6</td>
<td class=»tablerowvalue» colspan=2>
<INPUT TYPE=»TEXT» NAME=»WLANFLT_MAC» SIZE=»20″ MAXLENGTH=»20″ VALUE=»00:00:00:00:00:00″ class=»tableinputvalue» onBlur=»doMACcheck(this)»></td>
</tr>
<tr>
<td class=»tablerowheader» colspan=2>
#7</td>
<td class=»tablerowvalue» colspan=2>
<INPUT TYPE=»TEXT» NAME=»WLANFLT_MAC» SIZE=»20″ MAXLENGTH=»20″ VALUE=»00:00:00:00:00:00″ class=»tableinputvalue» onBlur=»doMACcheck(this)»></td>
</tr>
<tr>
<td class=»tablerowheader» colspan=2>
#8</td>
<td class=»tablerowvalue» colspan=2>
<INPUT TYPE=»TEXT» NAME=»WLANFLT_MAC» SIZE=»20″ MAXLENGTH=»20″ VALUE=»00:00:00:00:00:00″ class=»tableinputvalue» onBlur=»doMACcheck(this)»></td>
</tr>
</table><table width=»550″ cellpadding=»0″ cellspacing=»0″ border=»0″>
<tr>
<TD class=actionbuttons align=middle colspan=4 height=»24″>
<INPUT TYPE=»BUTTON» NAME=»SaveBtn» VALUE=»Submit» onClick=»doSave();»><INPUT TYPE=»HIDDEN» NAME=»CountryChange» VALUE=»0″><INPUT TYPE=»HIDDEN» NAME=»MBSSIDSwitchFlag» VALUE=»2″><INPUT TYPE=»HIDDEN» NAME=»wlanRadiusWEPFlag» VALUE=»0″></td></tr></table><br><TABLE width=550>
<TBODY>
<tr>
<TD class=tablefooter></td></tr><tr>
<TD class=copyright style=»HEIGHT: 8px»>&nbsp;</td></tr><tr>
<TD class=copyright>
Copyright &copy; 2010 All Rights Reserved.</td></tr></TBODY>
</table></form>
</body></html>

October 1 2009, 01:43

Приветствую! Есть cisco2811 c2800nm-advipservicesk9-mz.124-25b.bin

Настраиваю тунель, до товарища, находясь за NAT

crypto isakmp policy 10
encr 3des
authentication pre-share
group 2
lifetime 28800
crypto isakmp key masterkey»z» address 212.212.212.212
crypto isakmp keepalive 100 3
!
!
crypto ipsec transform-set z_vpn esp-3des esp-sha-hmac
!
crypto map z_vpn 10 ipsec-isakmp
set peer 212.212.212.212
set security-association lifetime seconds 28800
set transform-set z_vpn
set pfs group2
match address vpn_z
!

interface FastEthernet0/0
crypto map z_vpn

Нат, route делаю как мне нужно…

начинаю пинговать, происходит поднятие тунеля

….
Oct 1 00:45:51.828 MSD: ISAKMP:(0:0:N/A:0):Checking ISAKMP transform 1 against priority 10 policy
Oct 1 00:45:51.828 MSD: ISAKMP: encryption 3DES-CBC
Oct 1 00:45:51.828 MSD: ISAKMP: hash SHA
Oct 1 00:45:51.828 MSD: ISAKMP: default group 2
Oct 1 00:45:51.828 MSD: ISAKMP: auth pre-share
Oct 1 00:45:51.828 MSD: ISAKMP: life type in seconds
Oct 1 00:45:51.828 MSD: ISAKMP: life duration (basic) of 28800
Oct 1 00:45:51.828 MSD: ISAKMP:(0:0:N/A:0):atts are acceptable. Next payload is 0
Oct 1 00:45:51.832 MSD: CryptoEngine0: generating alg parameter for connid 1
Oct 1 00:45:51.868 MSD: CRYPTO_ENGINE: Dh phase 1 status: 0
Oct 1 00:45:51.868 MSD: CRYPTO_ENGINE: Dh phase 1 status: OK
Oct 1 00:45:51.868 MSD: ISAKMP:(0:1:SW:1):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
Oct 1 00:45:51.868 MSD: ISAKMP:(0:1:SW:1):Old State = IKE_I_MM2 New State = IKE_I_MM2

Oct 1 00:45:51.868 MSD: ISAKMP:(0:1:SW:1): sending packet to 212.212.212.212 my_port 500 peer_port 500 (I) MM_SA_SETUP
Oct 1 00:45:51.868 MSD: ISAKMP:(0:1:SW:1):Input = IK.E_MESG_INTERNAL, IKE_PROCESS_COMPLETE
Oct 1 00:45:51.868 MSD: ISAKMP:(0:1:SW:1):Old State = IKE_I_MM2 New State = IKE_I_MM3

Oct 1 00:45:52.244 MSD: ISAKMP (0:134217729): received packet from 212.212.212.212 dport 500 sport 500 Global (I) MM_SA_SETUP
Oct 1 00:45:52.244 MSD: ISAKMP:(0:1:SW:1):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
Oct 1 00:45:52.244 MSD: ISAKMP:(0:1:SW:1):Old State = IKE_I_MM3 New State = IKE_I_MM4

Oct 1 00:45:52.244 MSD: ISAKMP:(0:1:SW:1): processing KE payload. message ID = 0
Oct 1 00:45:52.244 MSD: CryptoEngine0: generating alg parameter for connid 0
Oct 1 00:45:52.292 MSD: ISAKMP:(0:1:SW:1): processing NONCE payload. message ID = 0
Oct 1 00:45:52.292 MSD: ISAKMP:(0:1:SW:1):found peer pre-shared key matching 212.212.212.212
Oct 1 00:45:52.292 MSD: CryptoEngine0: create ISAKMP SKEYID for conn id 1
Oct 1 00:45:52.292 MSD: ISAKMP:(0:1:SW:1):SKEYID state generated
Oct 1 00:45:52.292 MSD: ISAKMP:(0:1:SW:1): processing vendor id payload
Oct 1 00:45:52.292 MSD: ISAKMP:(0:1:SW:1): vendor ID is DPD
Oct 1 00:45:52.292 MSD: ISAKMP:(0:1:SW:1):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
Oct 1 00:45:52.292 MSD: ISAKMP:(0:1:SW:1):Old State = IKE_I_MM4 New State = IKE_I_MM4

Oct 1 00:45:52.296 MSD: ISAKMP:(0:1:SW:1):Send initial contact
Oct 1 00:45:52.296 MSD: ISAKMP:(0:1:SW:1):SA is doing pre-shared key authentication using id type ID_IPV4_ADDR
Oct 1 00:45:52.296 MSD: ISAKMP (0:134217729): ID payload
next-payload : 8
type : 1
address : 192.168.1.1
protocol : 17
port : 500
length : 12
Oct 1 00:50:06.464 MSD: ISAKMP:(0:1:SW:1):Total payload length: 12
Oct 1 00:50:06.464 MSD: CryptoEngine0: generate hmac context. for conn id 1
Oct 1 00:50:06.464 MSD: ISAKMP:(0:1:SW:1): sending packet to 212.212.212.212 my_port 500 peer_port 500 (I) MM_KEY_EXCH
Oct 1 00:50:06.464 MSD: ISAKMP:(0:1:SW:1):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
Oct 1 00:50:06.464 MSD: ISAKMP:(0:1:SW:1):Old State = IKE_I_MM4 New State = IKE_I_MM5
Oct 1 00:50:35.972 MSD: ISAKMP: received ke message (1/1)
Oct 1 00:50:35.972 MSD: ISAKMP: set new node 0 to QM_IDLE
Oct 1 00:50:35.972 MSD: ISAKMP:(0:1:SW:1):SA is still budding. Attached new ipsec request to it. (local 192.168.64.252, remote 212.176.25.252)
Oct 1 00:50:36.464 MSD: ISAKMP:(0:1:SW:1): retransmitting phase 1 MM_KEY_EXCH…
Oct 1 00:50:36.464 MSD: ISAKMP (0:134217729): incrementing error counter on sa, attempt 3 of 5: retransmit phase 1
… и опять и снова..

насколько я понял, не проходит авторизация, т.к. SA is doing pre-shared key authentication using id type ID_IPV4_ADDR
авторизируясь, в качестве ID_IPV4_ADDR посылается локальный айпи 192.168.1.1, что видно из ID payload… а надо-бы указать внешний… как это сделать? помогите советом!

заранее спасибо!

Contents

  • Internet Key Exchange Security Protocol Commands

  • accounting (IKE)

  • acl

  • address

  • authentication (IKE policy)

  • clear crypto isakmp

  • clear crypto isakmp call admission statistics

  • clear crypto isakmp errors

  • clear crypto session

  • crypto isakmp

  • crypto isakmp call admission limit

  • crypto isakmp client configuration group

  • crypto isakmp identity

  • crypto isakmp keepalive

  • crypto isakmp peer

  • crypto isakmp policy

  • crypto isakmp policy-set

  • crypto isakmp profile

  • crypto keyring

  • crypto logging

  • description (IKE policy)

  • description (ISAKMP policy-set)

  • description (ISAKMP peer)

  • description (keyring)

  • encryption (IKE policy)

  • group (IKE policy)

  • hash (IKE policy)

  • keepalive (ISAKMP profile)

  • key (IKE)

  • keyring

  • key-string (IKE)

  • lifetime (IKE policy)

  • local-address (keyring)

  • match identity (ISAKMP policy-set)

  • match identity (ISAKMP profile)

  • policy (ISAKMP policy-set)

  • pre-shared-key

  • rsa-pubkey

  • self-identity

  • set interface tunnel-ipsec

  • set ipsec-profile

  • show crypto isakmp call admission statistics

  • show crypto isakmp errors

  • show crypto isakmp key

  • show crypto isakmp peers

  • show crypto isakmp policy

  • show crypto isakmp profile

  • show crypto isakmp sa

  • show crypto isakmp stats

  • show crypto key pubkey-chain rsa

  • show crypto session

Internet Key Exchange Security Protocol Commands


This module describes the Cisco IOS XR software commands used to configure the Internet Key Exchange (IKE) securityprotocol.

For detailed information about IKE concepts, configuration tasks, and examples, see the Implementing Internet Key Exchange Security Protocol on the Cisco IOS XR Software module in the Cisco IOS XR System Security Configuration Guide for the Cisco CRS Router.

  • accounting (IKE)
  • acl
  • address
  • authentication (IKE policy)
  • clear crypto isakmp
  • clear crypto isakmp call admission statistics
  • clear crypto isakmp errors
  • clear crypto session
  • crypto isakmp
  • crypto isakmp call admission limit
  • crypto isakmp client configuration group
  • crypto isakmp identity
  • crypto isakmp keepalive
  • crypto isakmp peer
  • crypto isakmp policy
  • crypto isakmp policy-set
  • crypto isakmp profile
  • crypto keyring
  • crypto logging
  • description (IKE policy)
  • description (ISAKMP policy-set)
  • description (ISAKMP peer)
  • description (keyring)
  • encryption (IKE policy)
  • group (IKE policy)
  • hash (IKE policy)
  • keepalive (ISAKMP profile)
  • key (IKE)
  • keyring
  • key-string (IKE)
  • lifetime (IKE policy)
  • local-address (keyring)
  • match identity (ISAKMP policy-set)
  • match identity (ISAKMP profile)
  • policy (ISAKMP policy-set)
  • pre-shared-key
  • rsa-pubkey
  • self-identity
  • set interface tunnel-ipsec
  • set ipsec-profile
  • show crypto isakmp call admission statistics
  • show crypto isakmp errors
  • show crypto isakmp key
  • show crypto isakmp peers
  • show crypto isakmp policy
  • show crypto isakmp profile
  • show crypto isakmp sa
  • show crypto isakmp stats
  • show crypto key pubkey-chain rsa
  • show crypto session

accounting (IKE)

To enable authentication, authorization, and accounting (AAA) services for all peers that connect through the ISAKMP profile, use the accounting command in ISAKMP profile configuration mode. To return to the default value, use the no form of this command.

accounting
list-name

no
accounting

Syntax Description

list-name

Name of a client accounting list. The maximum length of characters is 127.

Command Default

The default value is no accounting.

Command Modes

ISAKMP profile configuration

Command History

Release

Modification

Release 3.4.0

This command was introduced.

Usage Guidelines

To use this command, you must be in a user group associated with a task group that includes appropriate task IDs. If the user group assignment is preventing you from using a command, contact your AAA administrator for assistance.

Task ID

Task ID

Operations

crypto

read, write

Examples

The following example shows how to create an accounting list:

RP/0/RP0/CPU0:router# configure
RP/0/RP0/CPU0:router(config)# crypto isakmp profile vpnprofile
RP/0/RP0/CPU0:router(config-isa-prof)# accounting aaalist

Related Commands

acl

To configure split tunneling, use the acl command in ISAKMP group configuration mode. To remove this command from your configuration and restore the default value, use the no form of this command.

acl
acl-name

acl

acl-name

no
acl
acl-name

Syntax Description

acl-name

Specifies a group of access control list (ACL) rules that represent protected subnets for split tunneling purposes.

Command Default

Split tunneling is not enabled; all data is sent through the Virtual Private Network (VPN) tunnel.

Command Modes

ISAKMP group configuration

Command History

Release

Modification

Release 2.0

This command was introduced.

Release 3.8.0

This command was removed.

Command History

Release

Modification

Release 3.2

This command was introduced.

Usage Guidelines

To use this command, you must be in a user group associated with a task group that includes appropriate task IDs. If the user group assignment is preventing you from using a command, contact your AAA administrator for assistance.

Use the acl command to specify which groups of ACLs represent protected subnets for split tunneling. Split tunneling is the ability to have a secure tunnel to the central site and simultaneous clear-text tunnels to the Internet.

Task ID

Task ID

Operations

crypto

read, write

Examples

The following example shows how to correctly apply split tunneling for the group name cisco. In this example, all traffic sourced from the client and destined to the subnet 192.168.1.0 are sent through the VPN tunnel.

RP/0/RP00/CPU0:router# configure
RP/0/RP00/CPU0:router(config)# crypto isakmp client configuration group cisco
RP/0/RP00/CPU0:router(config-group)# key cisco
RP/0/RP00/CPU0:router(config-group)# acl group1
RP/0/RP00/CPU0:router(config)# access-list 199 permit ip 192.168.1.0 0.0.0.255 any

Related Commands

address

To specify the IP address for the Rivest, Shamir, and Adelman (RSA) public key of the remote peer you manually configure, use the address command in public key configuration mode. To remove the IP address of the remote peer, use the no form of this command.

address
ip-address

no
address
ip-address

Syntax Description

ip-address

IP address of the remote RSA public key of the peer that you manually configure.

Command Modes

None

Public key configuration

Command History

Release

Modification

Release 2.0

This command was introduced.

Release 3.4.0

Example was modified to support the new crypto keyring structure by using the new crypto keyring and rsa-pubkey commands.

Usage Guidelines

To use this command, you must be in a user group associated with a task group that includes appropriate task IDs. If the user group assignment is preventing you from using a command, contact your AAA administrator for assistance.

Use the address command to specify the RSA public key for the IP Security (IPSec) peer you manually configure next.

When you finish specifying the RSA key, you must return to global configuration mode by entering quit at the public key configuration mode prompt.

Task ID

Task ID

Operations

crypto

read, write

Examples

The following example manually specifies the RSA public keys of an IPSec peer:

RP/0/RP0/CPU0:router# configure
RP/0/RP0/CPU0:router(config)# crypto keyring vpnkey
RP/0/RP0/CPU0:router(config-keyring)# rsa-pubkey name host.vpn.com
RP/0/RP0/CPU0:router(config-pubkey)# address 10.5.5.1
RP/0/RP0/CPU0:router(config-pubkey)# key-string 005C300D 06092A86 4886F70D 01010105
005C300D 06092A86 4886F70D 01010105
00034B00 30480241 00C5E23B 55D6AB22
04AEF1BA A54028A6 9ACC01C5 129D99E4
64CAB820 847EDAD9 DF0B4E4C 73A05DD2
BD62A8A9 FA603DD2 E2A8A6F8 98F76E28
D58AD221 B583D7A4 71020301 0001
quit

Related Commands

Command

Description

key-string (IKE)

Specifies the RSA public key of a remote peer.

rsa-pubkey

Defines the Rivest, Shamir, and Adelman (RSA) manual key to be used for encryption or signature during IKE authentication.

show crypto key pubkey-chain rsa

Displays peer RSA public keys stored on your router.

authentication (IKE policy)

To specify the authentication method within an Internet Key Exchange (IKE) policy, use the authentication command in ISAKMP policy configuration mode. To reset the authentication method to the default value, use the no form of this command.

authentication
{ pre-share | rsa-sig | rsa-encr }

no
authentication
{ pre-share | rsa-sig | rsa-encr }

Syntax Description

pre-share

Specifies preshared keys as the authentication method.

rsa-sig

Specifies RSA signatures as the authentication method.

rsa-encr

Specifies Rivest, Shamir, and Adelman (RSA) encrypted nonces as the authentication method.

Command Default

RSA signatures

Command Modes

ISAKMP policy configuration

Command History

Release

Modification

Release 2.0

This command was introduced.

Usage Guidelines

To use this command, you must be in a user group associated with a task group that includes appropriate task IDs. If the user group assignment is preventing you from using a command, contact your AAA administrator for assistance.

IKE policies define a set of parameters during IKE negotiation. Use the authentication command to specify the authentication method in an IKE policy. If you specify preshared keys, you must also separately configure these preshared keys.

If you specify RSA encrypted nonces, you must ensure that each peer has the RSA public keys of the other peers. (See the address, rsa-pubkey, and key-string commands.)

If you specify RSA signatures, you must configure your peer routers to obtain certificates from a certification authority (CA).

Task ID

Task ID

Operations

crypto

read, write

Examples

The following example shows how to configure an IKE policy with preshared keys as the authentication method (and with all other parameters set to the defaults):

RP/0/RP0/CPU0:router# configure
RP/0/RP0/CPU0:router(config)# crypto isakmp policy 15
RP/0/RP0/CPU0:router(config-isakmp)# authentication pre-share

The following example shows how to configure an IKE policy with RSA encrypted keys as the authentication method (and with all other parameters set to the defaults):

RP/0/RP0/CPU0:router# configure
RP/0/RP0/CPU0:router(config)# crypto isakmp policy 15
RP/0/RP0/CPU0:router(config-isakmp)# authentication rsa-encr

The following example configures an IKE policy with RSA signatures as the authentication method (and with all other parameters set to the defaults):

RP/0/RP0/CPU0:router# configure
RP/0/RP0/CPU0:router(config)# crypto isakmp policy 15
RP/0/RP0/CPU0:router(config-isakmp)# authentication rsa-sig

Related Commands

clear crypto isakmp

To clear active Internet Key Exchange (IKE) connections, use the clear crypto isakmp command in EXEC mode.

clear
crypto
isakmp
[connection-id]

Syntax Description

connection-id

(Optional) Name of connection to clear. The range is from 1 to 64000.

Command History

Release

Modification

Release 2.0

This command was introduced.

Release 3.5.0

The range for the connection-id argument was added.

Usage Guidelines

To use this command, you must be in a user group associated with a task group that includes appropriate task IDs. If the user group assignment is preventing you from using a command, contact your AAA administrator for assistance.


Note


If the connection-id argument is not used, all existing IKE connections are cleared when this command is issued.


Task ID

Task ID

Operations

crypto

execute

Examples

The following example shows how to clear an IKE connection between two peers connected by interfaces 172.21.114.123 and 172.21.114.67:

RP/0/RP0/CPU0:router# show crypto isakmp sa
vrf             dst             src             state           conn-id    nodeid
----------      ------------    ------------    ---------       -------    ------
default         172.21.114.123  172.21.114.67   QM_IDLE         1          0
default         172.0.0.2       172.0.0.1       QM_IDLE         8          0

RP/0/RP0/CPU0:router# configure
Enter configuration commands, one per line.  End with CNTL/Z.

RP/0/RP0/CPU0:router# clear crypto isakmp 1
RP/0/RP0/CPU0:router# show crypto isakmp sa

vrf             dst             src             state           conn-id    nodeid
----------      ------------    ------------    ---------       -------    ------
default         172.0.0.2       172.0.0.1       QM_IDLE         8          0

Related Commands

clear crypto isakmp call admission statistics

To clear ISAKMP call admission statistics, use the clear crypto isakmp call admission statistics command in EXEC mode.

clear
crypto
isakmp
call
isakmp
call
admission
statistics

Syntax Description

This command has no keywords or arguments.

Command History

Release

Modification

Release 3.4.0

This command was introduced.

Usage Guidelines

To use this command, you must be in a user group associated with a task group that includes appropriate task IDs. If the user group assignment is preventing you from using a command, contact your AAA administrator for assistance.

Task ID

Task ID

Operations

crypto

execute

Examples

The following example shows how to clear call admission statistics:

RP/0/RP0/CPU0:router# clear crypto isakmp call admission statistics

Related Commands

clear crypto isakmp errors

To clear the statistics for Internet Security Association and Key Management Protocol (ISAKMP) errors, use the clear crypto isakmp errors command in EXEC mode.

clear
crypto
isakmp
error

Syntax Description

This command has no keywords or arguments.

Command History

Release

Modification

Release 3.5.0

This command was introduced.

Usage Guidelines

To use this command, you must be in a user group associated with a task group that includes appropriate task IDs. If the user group assignment is preventing you from using a command, contact your AAA administrator for assistance.

Task ID

Task ID

Operations

crypto

execute

Examples

The following example shows how to clear ISAKMP error statistics:

RP/0/RP0/CPU0:router# show crypto isakmp errors

Control Plane Errors
---------------------
ERR NO MEMORY.....................................0
INVALID CERT......................................0
CRYPTO FAILURE....................................0
SA NOT AUTH.......................................0
AUTHENTICATION FAILED.............................0
GROUP AUTHOR FAILED...............................0
USER AUTHEN REJECTED..............................0
LOCAL ADDRESS FAILURE.............................0
FAILED TO CREATE SKEYID...........................0
RSA PUBLIC KEY NOT FOUND..........................0
RETRANSMITION LIMIT...............................0
MALFORMED MESSAGE.................................0
QUICK MODE TIMER EXPIRED..........................0
KEY NOT FOUND IN PROFILE..........................0
PROFILE NOT FOUND.................................0
PRESHARED KEY NOT FOUND...........................0
PHASE2 PROPOSAL NOT CHOSEN........................0
POLICY MISMATCH...................................0
NO POLICY FOUND...................................0
PACKET PROCESS FAILURE............................0

Warnings
---------
CERT DOESNT MATCH ID..............................0
CERT ISNT TRUSTED ROOT............................0
PACKET NOT ENCRYPTED..............................0
UNRELIABLE INFO MSG...............................0
NO SA.............................................0
BAD DOI SA........................................0
UNKNOWN EXCHANGE TYPE.............................0
OUTGOING PKT TOO BIG..............................0
INCOMING PKT TOO BIG..............................0

Informational
--------------
CAC DROPS.........................................0
DEFAULT POLICY ACCEPTED...........................0

RP/0/RP0/CPU0:router# clear crypto isakmp errors

Related Commands

Command

Description

show crypto isakmp errors

Displays the ISAKMP error that occurred during tunnel establishment.

clear crypto session

To delete crypto sessions (IP Security [IPSec] and Internet Key Exchange [IKE] security associations [SAs]), use the clear crypto session command in EXEC mode.

clear
crypto
session
[ user
username | group
group | interface | ivrf
vrf-name | local
ip-address | fvrf
vrf-name | remote
ip-address ]

Syntax Description

user username

(Optional) Specifies the name for the user.

group group

(Optional) Specifies the identity name for the group.

interface

(Optional) Specifies the name for the interface.

ivrf vrf-name

(Optional) Specifies the inside VRF (IVRF) session that is cleared.

local ip-address

(Optional) Clears crypto sessions for a local crypto endpoint. The ip-address argument is the IP address of the local crypto endpoint.

fvrf vrf-name

(Optional) Specifies the front door virtual routing and forwarding (FVRF) session that is cleared.

remote ip-address

(Optional) Clears crypto sessions for a remote IKE peer. The ip-address argument is the IP address of the remote IKE peer.

Command Default

If the clear crypto session command is entered without any keywords, all existing sessions are deleted. The IPSec SAs are deleted first. Then, the IKE SAs are deleted. The default value for the remote port is 500.

Command History

Release

Modification

Release 3.5.0

This command was introduced.

Usage Guidelines

To use this command, you must be in a user group associated with a task group that includes appropriate task IDs. If the user group assignment is preventing you from using a command, contact your AAA administrator for assistance.

To clear a specific crypto session or a subset of all the sessions, you need to provide session-specific parameters, such as local interface, local IP address, remote IP address (and port), FVRF name, or IVRF name.

If a local IP address is provided as a parameter, all the sessions (and their IKE SAs and IPSec SAs) that share the IP address as a local crypto endpoint (IKE local address) are deleted.

Task ID

Task ID

Operations

crypto

execute

Examples

The following example shows how to delete all crypto sessions:

RP/0/RP0/CPU0:router# clear crypto session

The following example shows that the crypto session of the FVRF named blue is deleted:

RP/0/RP0/CPU0:router# clear crypto session fvrf blue

The following example shows that the crypto session of the local endpoint 10.1.1.1 is deleted:

RP/0/RP0/CPU0:router# clear crypto session local 10.1.1.1

Related Commands

crypto isakmp

To globally enable Internet Key Exchange (IKE) at your peer router, use the crypto isakmp command in global configuration mode. To disable IKE at the peer, use the no form of this command.

crypto
isakmp

no
crypto
isakmp

Syntax Description

This command has no keywords or arguments.

Command Default

IKE is disabled.

Command Modes

Global configuration

Command History

Release

Modification

Release 2.0

This command was introduced.

Release 3.4.0

The crypto isakmp enable command was replaced with the crypto isakmp command.

Usage Guidelines

To use this command, you must be in a user group associated with a task group that includes appropriate task IDs. If the user group assignment is preventing you from using a command, contact your AAA administrator for assistance.

IKE need not be enabled for individual interfaces, but is enabled globally for all interfaces at the router.

Task ID

Task ID

Operations

crypto

read, write

Examples

The following example shows how to disable IKE at one peer:

RP/0/RP0/CPU0:router# configure
RP/0/RP0/CPU0:router(config)# crypto isakmp
RP/0/RP0/CPU0:router(config)# no crypto isakmp

crypto isakmp call admission limit

To deny incoming or outgoing session requests based on several metrics, use the crypto isakmp call admission limit command in global configuration mode. To disable this feature, use the no form of this command.

crypto
isakmp
call
admission
limit
{ cpu
{ total
percent | ike
percent } | in-negotiation-sa
number | sa
number }

no
crypto
isakmp
call
admission
limit
{ cpu
{ total
percent | ike
percent } | in-negotiation-sa
number | sa
number }

Syntax Description

cpu

Specifies the total resource limit for the CPU usage to accept new calls.

total percent

Specifies the maximum total CPU usage to accept new calls. The range for the percent argument is from 1 to 100.

ike percent

Specifies the maximum IKE CPU usage to accept new calls. The range for the percent argument is from 1 to 100.

in-negotiation-sa number

Specifies the maximum number of in-negotiation (embryonic) IKE security associations (SAs) that the router can establish before IKE begins rejecting new SA requests. The range for the number argument is from 1 to 100000.

sa number

Specifies that the maximum number of active IKE SAs that the router can establish before IKE begins rejecting new SA requests. You can configure a limit on the number of in-negotiation connects. This type of connect represents an aggressive mode IKE SA or main mode SA prior to the authentication and actual establishment. The range for the number argument is from 1 to 100000.

Command Default

The default value for the in-negotiation-sa keyword is set to 1000 SAs.

Command Modes

Global configuration

Command History

Release

Modification

Release 3.4.0

This command was introduced.

Usage Guidelines

To use this command, you must be in a user group associated with a task group that includes appropriate task IDs. If the user group assignment is preventing you from using a command, contact your AAA administrator for assistance.

A request for an IKE SA is denied if insufficient system resources exist to handle the negotiation.

Task ID

Task ID

Operations

crypto

read, write

Examples

The following example shows how to use the crypto isakmp call admission limit command:

RP/0/RP0/CPU0:router# configure
RP/0/RP0/CPU0:router(config)# crypto isakmp call admission limit cpu ike 30

Related Commands

Command

Description

crypto ipsec profile

Configures the IPSec profile.

crypto isakmp policy

Defines an IKE policy.

crypto isakmp client configuration group

To include the configuration of a local group profile, use the crypto isakmp client configuration group command in global configuration mode. To disable the profile for this local group, use the no form of this command.

crypto
isakmp
client
configuration
group
group-name

no
crypto
isakmp
client
configuration
group
group-name

Syntax Description

group-name

Text string that specifies the name of a group.

Command Modes

Global configuration

Command History

Release

Modification

Release 2.0

This command was introduced.

Release 3.8.0

This command was removed.

Usage Guidelines

To use this command, you must be in a user group associated with a task group that includes appropriate task IDs. If the user group assignment is preventing you from using a command, contact your AAA administrator for assistance.

The key command must be enabled if the client identifies itself with a preshared key.

The following commands are available in the IKE group policy configuration mode:

  • acl—Configures split tunneling. The acl-name argument specifies a group of access control list (ACL) rules that represent protected subnets for split tunneling purposes.
  • key—Specifies the Internet Key Exchange (IKE) preshared key for group policy attribute definition. The key command must be enabled if the client identifies itself with a preshared key.

Use the crypto isakmp client configuration group command to enter group configuration mode.

Task ID

Task ID

Operations

crypto

read, write

Examples

The following example shows how to include the configuration of a local group profile with the group name marketing:

RP/0/RP0/CPU0:router# configure
RP/0/RP0/CPU0:router(config)# crypto isakmp client configuration group marketing
RP/0/RP0/CPU0:router(config-group)#

Related Commands

Command

Description

acl

Configures split tunneling.

crypto ipsec profile

Configures the IPSec profile.

crypto isakmp policy

Defines an IKE policy.

key (IKE)

Specifies the IKE preshared key for group policy attribute definition.

crypto isakmp identity

To specify the identity used by the router when participating in the Internet Key Exchange (IKE) protocol, use the crypto isakmp identity command in global configuration mode. To reset the Internet Security Association Key Management Protocol (ISAKMP) identity to the default value (address), use the no form of this command.

crypto
isakmp
identity
{ address | hostname }

no
crypto
isakmp
identity

Syntax Description

address

Sets the ISAKMP identity to the IP address of the interface that communicates to the remote peer during IKE negotiations.

hostname

Sets the ISAKMP identity to the host name concatenated with the domain name (for example, myhost.example.com).

Command Default

The IP address is used for the ISAKMP identity.

Command Modes

Global configuration

Command History

Release

Modification

Release 2.0

This command was introduced.

Release 3.4.0

Example was modified to support the new crypto keyring structure by using the new crypto keyring and pre-shared-key commands

Usage Guidelines

To use this command, you must be in a user group associated with a task group that includes appropriate task IDs. If the user group assignment is preventing you from using a command, contact your AAA administrator for assistance.

Use the crypto isakmp identity command to specify an ISAKMP identity either by IP address or by hostname. As a general rule, you should set all identities for peers in the same way—either by IP address or by hostname.

Set an ISAKMP identity whenever you specify preshared keys.

Use the address keyword when only one interface (and therefore only one IP address) is used by the peer for IKE negotiations, and the IP address is known.

Use the hostname keyword if more than one interface on the peer might be used for IKE negotiations, or if the IP address for the interface is unknown (such as with dynamically assigned IP addresses).

Task ID

Task ID

Operations

crypto

read, write

Examples

The following example shows how to use preshared keys at two peers and set both their ISAKMP identities to the IP address.

At the local peer (at 10.0.0.1), the ISAKMP identity is set and the preshared key is specified.

RP/0/RP0/CPU0:router(config)# crypto isakmp identity address
RP/0/RP0/CPU0:router(config)# crypto keyring keyring1
RP/0/RP0/CPU0:router(config-keyring)# pre-shared-key address 192.168.1.33 key presharedkey

At the remote peer (at 192.168.1.33), the ISAKMP identity is set and the same preshared key is specified.

RP/0/RP0/CPU0:router(config)# crypto isakmp identity address
RP/0/RP0/CPU0:router(config)# crypto keyring keyring1
RP/0/RP0/CPU0:router(config-keyring)# pre-shared-key address 10.0.0.1 key presharedkey

Note


In the preceding example, if the crypto isakmp identity command had not been performed, the ISAKMP identities would still have been set to the IP address, the default identity.


The following example shows how to use preshared keys at two peers and set both their ISAKMP identities to the host name.

At the local peer, the ISAKMP identity is set and the preshared key is specified.

RP/0/RP0/CPU0:router(config)# crypto isakmp identity hostname
RP/0/RP0/CPU0:router(config)# crypto keyring keyring1
RP/0/RP0/CPU0:router(config-keyring)# pre-shared-key hostname remoterouter.example.com key presharedkey

At the remote peer, the ISAKMP identity is set and the same preshared key is specified.

RP/0/RP0/CPU0:router(config)# crypto isakmp identity hostname
RP/0/RP0/CPU0:router(config)# crypto keyring keyring1
RP/0/RP0/CPU0:router(config-keyring)# pre-shared-key hostname localrouter.example.com key presharedkey

Related Commands

crypto isakmp keepalive

To use the Internet Key Exchange (IKE) security association (SA) feature for providing a mechanism for detecting loss of connectivity between two IP Security (IPSec) peers, use the crypto isakmp keepalive command in global configuration mode. To disable this feature, use the no form of this command.

crypto
isakmp
keepalive
seconds
retry-seconds

no
crypto
isakmp
keepalive

Syntax Description

seconds

Number of seconds between keepalive messages. The range is from 10 to 3600.

retry-seconds

Number of seconds between retries if keepalive fails. The range is from 2 to 60.

Command Default

IKE does not send keepalive messages until specified by this command.

Command Modes

Global configuration

Command History

Release

Modification

Release 2.0

This command was introduced.

Usage Guidelines

To use this command, you must be in a user group associated with a task group that includes appropriate task IDs. If the user group assignment is preventing you from using a command, contact your AAA administrator for assistance.

If IKE does not receive the keepalive acknowledge message from the peer after four tries, IKE concludes that it has lost connectivity with its peer.

Task ID

Task ID

Operations

crypto

read, write

Examples

The following example shows how to set the number of seconds between keepalive messages to 20 seconds, and the number of seconds between retries to 20 seconds if keepalive fails:

RP/0/RP0/CPU0:router# configure
RP/0/RP0/CPU0:router(config)# crypto isakmp keepalive 20 20 on-demand

Related Commands

Command

Description

crypto isakmp identity

Specifies the identity the router uses when participating in the IKE protocol.

crypto isakmp peer

To enable an IP Security (IPSec) peer for Internet Key Exchange (IKE), use the crypto isakmp peer command in global configuration mode. To disable this functionality, use the no form of this command.

crypto
isakmp
peer
{ address
ip-address | hostname
hostname }
[ description
line | vrf
fvrf-name ]

no
crypto
isakmp
peer
{ address
ip-address | hostname
hostname }
[ description
line | vrf
vrf-name ]

Syntax Description

address ip-address

Specifies the IP address of the peer router.

hostname hostname

Specifies the hostname of the peer.

description line

(Optional) Specifies the IKE peer description. The maximum number of characters you can use to describe the peer is 80.

vrf vrf-name

(Optional) Specifies the VPN routing and forwarding (VRF) routing table through which the peer is reachable. The fvrf-name argument must match the FVRF name that was defined during VPN routing and forwarding (VRF) configuration.

Command Modes

Global configuration

Command History

Release

Modification

Release 3.5.0

This command was introduced.

Usage Guidelines

To use this command, you must be in a user group associated with a task group that includes appropriate task IDs. If the user group assignment is preventing you from using a command, contact your AAA administrator for assistance.

Use the crypto isakmp peer command to enter ISAKMP peer configuration mode.

You can give a peer that is identified by an IP address a meaningful name or description.

Task ID

Task ID

Operations

crypto

read, write

Examples

The following example shows that the peer address is 40.40.40.2 and named citeA:

RP/0/RP0/CPU0:router# configure
RP/0/RP0/CPU0:router(config)# crypto isakmp peer address 40.40.40.2
RP/0/RP0/CPU0:router(config-isakmp-peer)# description citeA
RP/0/RP0/CPU0:router(config-isakmp-peer)# commit

RP/0/RP0/CPU0:router# show crypto isakmp peers
Peer: 60.60.60.2   Port: 500   Local: 70.70.70.2   vrf: default
  UDP encapsulate: False
  SA information:
    Connection ID: 2
    State: QM_IDLE
    Phase 1 ID: IPV4_ADDR 60.60.60.2

Peer: 40.40.40.2   Port: 500   Local: 50.50.50.2   vrf: default
  Description: peerA
  UDP encapsulate: False
  SA information:
    Connection ID: 1
    State: QM_IDLE
    Phase 1 ID: IPV4_ADDR 40.40.40.2

Related Commands

crypto isakmp policy

To define an Internet Key Exchange (IKE) policy, use the crypto isakmp policy command in global configuration mode. To delete an IKE policy, use the no form of this command.

crypto
isakmp
policy
priority

no
crypto
isakmp
policy
priority

Syntax Description

priority

Value that uniquely identifies the IKE policy and assigns a priority to the protection policy. Use an integer from 1 to 10000, with 1 being the highest priority and 10000 the lowest.

Command Default

There is a default policy, which always has the lowest priority. The default policy contains default values for the encryption, hash, authentication, Diffie-Hellman group, and lifetime parameters. (The parameter defaults are listed in the “Usage Guidelines” section.) When you create an IKE policy, the default for a particular parameter is used if no value is specified.

Command Modes

Global configuration

Command History

Release

Modification

Release 2.0

This command was introduced.

Usage Guidelines

To use this command, you must be in a user group associated with a task group that includes appropriate task IDs. If the user group assignment is preventing you from using a command, contact your AAA administrator for assistance.

Use the crypto isakmp policy command to specify the parameters to use during an IKE negotiation. (These parameters create the IKE security association [SA].)

The crypto isakmp policy command enters ISAKMP policy configuration mode. The following commands are available in this mode to specify the parameters in the policy:

  • authentication (IKE policy) command—Specifies that the default values are Rivest, Shamir, and Adelman (RSA) signatures.
  • description (IKE policy) command—Creates a description of an IKE policy.
  • encryption (IKE policy) command— Sets the encryption algorithm for protection suite according to one of the following standards.
  • group (IKE policy) command—Specifies that the default value is 768-bit Diffie-Hellman.
  • hash (IKE policy) command—Specifies that the default value is SHA-1.
  • lifetime (IKE policy) command—Specifies that the default value is 86,400 seconds (1 day).

If you do not specify one of these commands for a policy, the default value is used for that parameter.

You can configure multiple IKE policies on each peer participating in IP Security (IPSec). When the IKE negotiation begins, it tries to find a common policy configured on both peers, starting with the highest priority policies as specified on the remote peer.

Task ID

Task ID

Operations

crypto

read, write

Examples

The following example shows how to configure two policies for the peer:

RP/0/RP0/CPU0:router# configure
RP/0/RP0/CPU0:router(config)# crypto isakmp policy 15
RP/0/RP0/CPU0:router(config-isakmp)# hash md5
RP/0/RP0/CPU0:router(config-isakmp)# authentication rsa-sig
RP/0/RP0/CPU0:router(config-isakmp)# group 2
RP/0/RP0/CPU0:router(config-isakmp)# lifetime 5000
RP/0/RP0/CPU0:router(config-isakmp)# exit

RP/0/RP0/CPU0:router(config)# crypto isakmp policy 20
RP/0/RP0/CPU0:router(config-isakmp)# authentication pre-share
RP/0/RP0/CPU0:router(config-isakmp)# lifetime 10000
RP/0/RP0/CPU0:router(config-isakmp)# exit

The configuration results in the following policies:

Protection suite priority 15
  encryption algorithm: DES - Data Encryption Standard (56 bit keys)
  hash algorithm: Message Digest 5
  authentication method: Rivest-Shamir-Adelman Signature
  Diffie-Hellman Group: #2 (1024 bit)
  lifetime: 5000 seconds, no volume limit
Protection suite priority 20
  encryption algorithm: DES - Data Encryption Standard (56 bit keys)
  hash algorithm: Secure Hash Standard
  authentication method: Pre-Shared Key
  Diffie-Hellman Group: #1 (768 bit)
  lifetime: 10000 seconds, no volume limit
Default protection suite
  encryption algorithm: DES - Data Encryption Standard (56 bit keys)
  hash algorithm: Secure Hash Standard
  authentication method: Rivest-Shamir-Adleman Signature
  Diffie-Hellman Group: #1 (768 bit)
  lifetime: 86400 seconds, no volume limit

IKE policy 15 is the highest priority, and the default policy is the lowest priority.

Related Commands

crypto isakmp policy-set

To define a policy set for an ISAKMP protection suite, use the crypto isakmp policy-set command in global configuration mode. To cancel a previously configured policy set, use the no variant to the command.

crypto
isakmp
policy-set
policy-name

no
crypto
isakmp
policy-set
policy-name

Syntax Description

policy-name

Name of the policy set.

Command Modes

Global configuration

Command History

Release

Modification

Release 3.6.0

This command was introduced.

Usage Guidelines

To use this command, you must be in a user group associated with a task group that includes appropriate task IDs. If the user group assignment is preventing you from using a command, contact your AAA administrator for assistance.

Use of this command takes you to ISAKMP policy set configuration mode.

Task ID

Task ID

Operations

crypto

read, write

Examples

The following example shows how to define an ISAKMP policy set, based on the local address, to restrict users with remote access from accessing certain ISAKMP policies:

RP/0/RP0/CPU0:router# configure
RP/0/RP0/CPU0:router(config)# crypto isakmp policy-set mypolicy
RP/0/RP0/CPU0:router(config-isakmp-pol-set)# 

Related Commands

crypto isakmp profile

To define an ISAKMP profile and audit IPSec user sessions, use the crypto isakmp profile command in global configuration mode. To delete a crypto ISAKMP profile, use the no form of this command.

crypto
isakmp
profile
{ profile-name | local
profile-name }

no
crypto
isakmp
profile
{ profile-name | local
profile-name }

Syntax Description

local

Specifies that the profile is used for locally sourced or terminated traffic.

Note   

The local keyword is used for the ISAKMP profile to define locally sourced or destined traffic. This traffic is decrypted or encrypted by the route processor (RP).

profile-name

Name of the user profile. To associate a user profile with the RADIUS server, the user profile name must be identified.

Command Modes

Global configuration

Command History

Release

Modification

Release 3.4.0

This command was introduced.

Usage Guidelines

To use this command, you must be in a user group associated with a task group that includes appropriate task IDs. If the user group assignment is preventing you from using a command, contact your AAA administrator for assistance.

The local keyword is used in the ISAKMP profile to define locally sourced or destined traffic. This traffic is decrypted or encrypted by the route processor (RP) rather than by the Cisco IPSec VPN SPA.

The peers are mapped to an ISAKMP profile when their identities are matched (as given in the identification [ID] payload of the Internet Key Exchange [IKE]) against the identities defined in the ISAKMP profile. To uniquely map to an ISAKMP profile, no two ISAKMP profiles should match the same identity. If the peer identity is matched in two ISAKMP profiles, the configuration is invalid. At least one match identity command must also be defined in the ISAKMP profile for the profile to be complete.

Before you configure an ISAKMP profile, the key rings that are used for the profile should be configured.

Task ID

Task ID

Operations

crypto

read, write

Examples

The following example shows how to define an ISAKMP profile and match the peer identities:

RP/0/RP0/CPU0:router# configure
RP/0/RP0/CPU0:router(config)# crypto isakmp profile local vpnprofile
RP/0/RP0/CPU0:router(config-isa-prof)# match identity local group vpngroup
RP/0/RP0/CPU0:router(config-isa-prof-match)# set interface tunnel-ipsec 1

Related Commands

crypto keyring

To define a crypto keyring during IKE authentication, use the crypto keyring command in global configuration mode. To remove the keyring, use the no form of this command.

crypto
keyring
keyring-name
[ vrf
fvrf-name ]

no
crypto
keyring
keyring-name
[ vrf
fvrf-name ]

Syntax Description

keyring-name

Name of the crypto keyring. The maximum length of the keyring name is 32 characters.

vrf fvrf-name

(Optional) Specifies that the front door virtual routing and forwarding (FVRF) name to which the keyring is referenced. The fvrf-name argument must match the FVRF name that was defined during virtual routing and forwarding (VRF) configuration.

Command Default

If the vrf keyword is not defined, the keyring is referenced to the global VRF.

Command Modes

Global configuration

Command History

Release

Modification

Release 3.4.0

This command was introduced.

Usage Guidelines

To use this command, you must be in a user group associated with a task group that includes appropriate task IDs. If the user group assignment is preventing you from using a command, contact your AAA administrator for assistance.

A keyring is a repository of preshared and RSA public keys. The keyring is used in global configuration mode. The ISAKMP profile successfully completes authentication of peers if the peer keys are defined in the keyring that is attached to this profile.

Use the crypto keyring command to enter keyring configuration mode.

Task ID

Task ID

Operations

crypto

read, write

Examples

The following example shows how to use the crypto keyring command:

RP/0/RP0/CPU0:router# configure
RP/0/RP0/CPU0:router(config)# crypto keyring vpnkey
RP/0/RP0/CPU0:router(config-keyring)# pre-shared-key address 10.72.23.11 key vpnsecret

Related Commands

Command

Description

crypto isakmp identity

Specifies the identity used by the router when participating in the Internet Key Exchange (IKE) protocol.

description (keyring)

Creates a description for a keyring.

local-address (keyring)

Limits the scope of an ISAKMP keyring configuration to a local termination address or interface.

pre-shared-key

Defines a preshared key for IKE authentication.

rsa-pubkey

Defines the Rivest, Shamir, and Adelman (RSA) public key by address or hostname.

crypto logging

To enable the appearance of the cyrpto tunnel up or down message, use the crypto logging command in global configuration mode. To disable this option, use the no form of this command.

crypto
logging
tunnel-status

no
crypto
logging
tunnel-status

Syntax Description

tunnel-status

Enables the logging for the tunnel-status.

Command Default

The default is disabled.

Command Modes

Global configuration

Command History

Release

Modification

Release 3.5.0

This command was introduced.

Usage Guidelines

To use this command, you must be in a user group associated with a task group that includes appropriate task IDs. If the user group assignment is preventing you from using a command, contact your AAA administrator for assistance.

Task ID

Task ID

Operations

crypto

read, write

Examples

The following example shows how to use the crypto logging command:

RP/0/RP0/CPU0:router# configure
RP/0/RP0/CPU0:router(config)# crypto logging tunnel-status

description (IKE policy)

To create a description for an Internet Key Exchange (IKE) policy, use the description command in ISAKMP policy configuration mode. To delete an IKE policy description, use the no form of this command.

description
string

no
description

Syntax Description

string

Character string describing the IKE policy.

Command Modes

Global configuration

Command History

Release

Modification

Release 2.0

This command was introduced.

Usage Guidelines

To use this command, you must be in a user group associated with a task group that includes appropriate task IDs. If the user group assignment is preventing you from using a command, contact your AAA administrator for assistance.

Task ID

Task ID

Operations

crypto

read, write

Examples

The following example shows the creation of an IKE policy description:

RP/0/RP0/CPU0:router# configure
RP/0/RP0/CPU0:router(config)# crypto isakmp policy 15
RP/0/RP0/CPU0:router(config-isakmp)# description this is a sample IKE policy

description (ISAKMP policy-set)

To create a description for an ISAKMP policy set, use the description command in ISAKMP policy configuration mode. To delete an ISAKMP policy-set description, use the no form of this command.

description
string

no
description

Syntax Description

string

Character string describing the IKE policy set.

Command Modes

ISAKMP policy configuration

Command History

Release

Modification

Release 3.6.0

This command was introduced.

Usage Guidelines

To use this command, you must be in a user group associated with a task group that includes appropriate task IDs. If the user group assignment is preventing you from using a command, contact your AAA administrator for assistance.

Use the description command inside the ISAKMP policy-set configuration submode to create a description for an IKE policy set.

Task ID

Task ID

Operations

crypto

read, write

Examples

The following example shows the creation of an IKE policy description:

RP/0/RP0/CPU0:router# configure
RP/0/RP0/CPU0:router(config)# crypto isakmp policy-set pol1
RP/0/RP0/CPU0:router(config-isakmp-pol-set)# description this is a sample IKE policy-set

Related Commands

description (ISAKMP peer)

To add the description of an Internet Key Exchange (IKE) peer, use the description command in ISAKMP peer configuration mode. To delete the description, use the no form of this command.

description
string

no
description
string

Syntax Description

string

Description given to an IKE peer. The maximum number of characters is 80.

Command Modes

ISAKMP peer configuration

Command History

Release

Modification

Release 3.5.0

This command was introduced.

Usage Guidelines

To use this command, you must be in a user group associated with a task group that includes appropriate task IDs. If the user group assignment is preventing you from using a command, contact your AAA administrator for assistance.

IKE peers that “sit” behind a Network Address Translation (NAT) device cannot be uniquely identified; therefore, they have to share the same peer description.

Task ID

Task ID

Operations

crypto

read, write

Examples

The following example shows that the description «connection from site A» is added for an IKE peer:

RP/0/RP0/CPU0:router# configure
RP/0/RP0/CPU0:router(config)# crypto isakmp peer address 10.2.2.9
RP/0/RP0/CPU0:router(config-isakmp-peer)# description connection from site A

Related Commands

Command

Description

clear crypto session

Deletes crypto sessions IPSec and IKE SAs for an ISAKMP group and user.

crypto isakmp peer

Enables an IP Security (IPSec) peer for Internet Key Exchange (IKE).

show crypto isakmp peers

Displays peer structures.

show crypto session

Displays status information for active crypto sessions.

auto-update client

Deletes crypto sessions IPSec and IKE SAs for an ISAKMP group and user.

description (keyring)

To create a one-line description for a keyring, use the description command in keyring configuration mode. To delete a keyring description, use the no form of this command.

description
string

no
description

Syntax Description

string

Character string describing the keyring.

Command Default

The default description is blank.

Command Modes

Keyring configuration

Command History

Release

Modification

Release 3.4.0

This command was introduced.

Usage Guidelines

To use this command, you must be in a user group associated with a task group that includes appropriate task IDs. If the user group assignment is preventing you from using a command, contact your AAA administrator for assistance.

Task ID

Task ID

Operations

crypto

read, write

Examples

The following example shows the creation of a keyring description:

RP/0/RP0/CPU0:router# configure
RP/0/RP0/CPU0:router(config)# crypto keyring vpnkey
RP/0/RP0/CPU0:router(config-keyring)# description this is a sample keyring

Related Commands

Command

Description

crypto keyring

Defines a crypto keyring during IKE authentication.

encryption (IKE policy)

To specify the encryption algorithm within an Internet Key Exchange (IKE) policy, use the encryption command in ISAKMP policy configuration mode. To reset the encryption algorithm to the default value, use the no form of this command.

encryption
{ des | 3des | aes | aes
192 | aes
256 }

no
encryption

Syntax Description

des

Specifies 56-bit DES-CBC as the encryption algorithm. This option is the default value.

3des

Specifies 168-bit Digital Encryption Standard (DES) as the encryption algorithm.

aes

Specifies 128-bit Advanced Encryption Standard (AES) as the encryption algorithm.

aes 192

Specifies 192-bit AES as the encryption algorithm.

aes 256

Specifies 256-bit AES as the encryption algorithm.

Command Default

The 56-bit DES-CBC encryption algorithm (des).

Command Modes

ISAKMP policy configuration

Command History

Release

Modification

Release 2.0

This command was introduced.

Usage Guidelines

To use this command, you must be in a user group associated with a task group that includes appropriate task IDs. If the user group assignment is preventing you from using a command, contact your AAA administrator for assistance.

IKE policies define a set of parameters during IKE negotiation. Use the encryption command to specify the encryption algorithm in an IKE policy.

Task ID

Task ID

Operations

crypto

read, write

Examples

The following example shows how to configure an IKE policy with the 3DES encryption algorithm (and with all other parameters set to the defaults):

RP/0/RP0/CPU0:router# configure
RP/0/RP0/CPU0:router(config)# crypto isakmp policy 15
RP/0/RP0/CPU0:router(config-isakmp)# encryption 3des

Related Commands

group (IKE policy)

To specify the Diffie-Hellman group identifier within an Internet Key Exchange (IKE) policy, use the group command in ISAKMP policy configuration mode. To reset the Diffie-Hellman group identifier to the default value, use the no form of this command.

group
{ 1 | 2 | 5 }

no
group

Syntax Description

1

Specifies the 768-bit Diffie-Hellman group. This option is the default.

2

Specifies the 1024-bit Diffie-Hellman group.

5

Specifies the 1536-bit Diffie-Hellman group.

Command Default

The default is 768-bit Diffie-Hellman (group 1).

Command Modes

ISAKMP policy configuration

Command History

Release

Modification

Release 2.0

This command was introduced.

Usage Guidelines

To use this command, you must be in a user group associated with a task group that includes appropriate task IDs. If the user group assignment is preventing you from using a command, contact your AAA administrator for assistance.

IKE policies define a set of parameters during IKE negotiation. Use the group (IKE policy) command to specify the Diffie-Hellman group in an IKE policy.

Task ID

Task ID

Operations

crypto

read, write

Examples

The following example shows how to configure an IKE policy with the 1024-bit Diffie-Hellman group (all other parameters are set to the defaults):

RP/0/RP0/CPU0:router# configure
RP/0/RP0/CPU0:router(config)# crypto isakmp policy 15
RP/0/RP0/CPU0:router(config-isakmp)# group 2

Related Commands

hash (IKE policy)

To specify the hash algorithm within an Internet Key Exchange (IKE) policy, use the hash command in ISAKMP policy configuration mode. To reset the hash algorithm to the default SHA-1 hash algorithm, use the no form of this command.

hash
{ sha | md5 }

no
hash

Syntax Description

sha

Specifies SHA-1 (Hashed Message Authentication Code [HMAC]) as the hash algorithm. This option is the default.

md5

Specifies Message Digest 5 (MD5) (HMAC variant) as the hash algorithm.

Command Default

SHA-1 hash algorithm

Command Modes

ISAKMP policy configuration

Command History

Release

Modification

Release 2.0

This command was introduced.

Usage Guidelines

To use this command, you must be in a user group associated with a task group that includes appropriate task IDs. If the user group assignment is preventing you from using a command, contact your AAA administrator for assistance.

Use the hash command to specify the hash algorithm in an IKE policy. IKE policies define a set of parameters during IKE negotiation.

Task ID

Task ID

Operations

crypto

read, write

Examples

The following example shows how to configure an IKE policy with the MD5 hash algorithm (all other parameters are set to the defaults):

RP/0/RP0/CPU0:router# configure
RP/0/RP0/CPU0:router(config)# crypto isakmp policy 15
RP/0/RP0/CPU0:router(config-isakmp)# hash md5

Related Commands

keepalive (ISAKMP profile)

To let the gateway send dead peer detection (DPD) messages to the peer, use the keepalive command in ISAKMP profile configuration mode. To return to the default, use the no form of this command.

keepalive
disable

no
keepalive

Syntax Description

disable

Disables keepalive global declarations.

Command Default

Keepalive is enabled.

Command Modes

ISAKMP profile configuration

Command History

Release

Modification

Release 3.4.0

This command was introduced.

Usage Guidelines

To use this command, you must be in a user group associated with a task group that includes appropriate task IDs. If the user group assignment is preventing you from using a command, contact your AAA administrator for assistance.

Task ID

Task ID

Operations

crypto

read, write

Examples

The following example shows how to use the keepalive command:

RP/0/RP0/CPU0:router# configure
RP/0/RP0/CPU0:router(config)# crypto isakmp profile vpnprofile
RP/0/RP0/CPU0:router(config-isa-prof)# keepalive disable
 

Related Commands

key (IKE)

To specify the Internet Key Exchange (IKE) preshared key for group policy attribute definition, use the key command in ISAKMP group configuration mode. To remove a preshared key, use the no form of this command.

key
preshared-key

no
key
preshared-key

Syntax Description

preshared-key

IKE preshared key for group policy attribute definition.

Command Modes

ISAKMP group configuration

Command History

Release

Modification

Release 2.0

This command was introduced.

Release 3.8.0

This command was removed.

Usage Guidelines

To use this command, you must be in a user group associated with a task group that includes appropriate task IDs. If the user group assignment is preventing you from using a command, contact your AAA administrator for assistance.

Use the key command to specify the IKE preshared key when defining group policy information for mode configuration push. (It follows the crypto isakmp client configuration group command.) You must configure the key command if the client identifies itself to the router with a preshared key. (You need not enable this command if the client uses a certificate for identification.)

Task ID

Task ID

Operations

crypto

read, write

Examples

The following example shows how to specify the preshared key named cisco:

RP/0/RP0/CPU0:router# configure
RP/0/RP0/CPU0:router(config)# crypto isakmp client configuration group default
RP/0/RP0/CPU0:router(config-group)# key cisco
RP/0/RP0/CPU0:router(config-group)# acl group1

Related Commands

keyring

To configure a keyring with an ISAKMP profile, use the keyring command in ISAKMP profile configuration mode. To remove the keyring from the ISAKMP profile, use the no form of this command.

keyring
kr-name1
[ kr-name2
[ kr-name3
[ kr-name4
[ kr-name5
[kr-name6] ] ] ] ]

no
keyring
kr-name1
[ kr-name2
[ kr-name3
[ kr-name4
[ kr-name5
[kr-name6] ] ] ] ]

Syntax Description

kr-name1

Name for keyring 1 that must match the keyring name that was defined in the global configuration.

kr-name2

Name for keyring 2 that must match the keyring name that was defined in the global configuration.

kr-name3

Name for keyring 3 that must match the keyring name that was defined in the global configuration.

kr-name4

Name for keyring 4 that must match the keyring name that was defined in the global configuration.

kr-name5

Name for keyring 5 that must match the keyring name that was defined in the global configuration.

kr-name6

Name for keyring 6 that must match the keyring name that was defined in the global configuration.

Command Modes

ISAKMP profile configuration

Command History

Release

Modification

Release 3.4.0

This command was introduced.

Usage Guidelines

To use this command, you must be in a user group associated with a task group that includes appropriate task IDs. If the user group assignment is preventing you from using a command, contact your AAA administrator for assistance.

The ISAKMP profile successfully completes authentication of peers if the peer keys are defined in the keyring that is attached to this profile. You must define at least one keyring.

An ISAKMP profile can define one or more keyrings. For example, multiple keyrings can be used when few IKE peer endpoints are in the public address space; whereas, others are in the front door virtual routing and forwarding (FVRF) space as the IKE local endpoints.

Task ID

Task ID

Operations

crypto

read, write

Examples

The following example shows how to configure vpnkeyring as the keyring name:

RP/0/RP0/CPU0:router# configure
RP/0/RP0/CPU0:router(config)# crypto isakmp profile vpnprofile
RP/0/RP0/CPU0:router(config-isa-prof)# keyring vpnkeyring

Related Commands

key-string (IKE)

To manually specify the Rivest, Shamir, and Adelman (RSA) public key of a remote peer, use the key-string command in public key configuration mode.

Syntax Description

key-string

Public key for a remote peer. Enter the key in hexadecimal format.

Command Modes

Public key configuration

Command History

Release

Modification

Release 2.0

This command was introduced.

Usage Guidelines

To use this command, you must be in a user group associated with a task group that includes appropriate task IDs. If the user group assignment is preventing you from using a command, contact your AAA administrator for assistance.

Use the key-string command to manually specify the RSA public key of an IP Security (IPSec) peer. Before using this command, you must identify the remote peer.

To avoid mistakes, you should cut and paste the key data (instead of attempting to type in the data).

When you finish specifying the RSA key, you must return to global configuration mode by entering quit at the public key configuration mode prompt.

Task ID

Task ID

Operations

crypto

read, write

Examples

The following example shows how to manually specify the RSA public keys of an IPSec peer:

RP/0/RP0/CPU0:router# configure
RP/0/RP0/CPU0:router(config)# crypto keyring vpnkeyring
RP/0/RP0/CPU0:router(config-keyring)# rsa-pubkey address 10.5.5.1
RP/0/RP0/CPU0:router(config-pubkey)# key-string 005C300D 06092A86 4886F70D 01010105
00034B00 30480241 00C5E23B 55D6AB22
04AEF1BA A54028A6 9ACC01C5 129D99E4
64CAB820 847EDAD9 DF0B4E4C 73A05DD2
BD62A8A9 FA603DD2 E2A8A6F8 98F76E28
D58AD221 B583D7A4 71020301 0001
quit

Related Commands

lifetime (IKE policy)

To specify the lifetime of an Internet Key Exchange (IKE) security association (SA), use the lifetime command in ISAKMP policy configuration mode. To reset the SA lifetime to the default value, use the no form of this command.

lifetime
seconds

no
lifetime

Syntax Description

seconds

Length of time (in seconds) that each SA should exist before expiring. Use an integer from 60 to 86400 seconds.

Command Default

86400 seconds (1 day)

Command Modes

ISAKMP policy configuration

Command History

Release

Modification

Release 2.0

This command was introduced.

Usage Guidelines

To use this command, you must be in a user group associated with a task group that includes appropriate task IDs. If the user group assignment is preventing you from using a command, contact your AAA administrator for assistance.

Use the lifetime command to specify how long an IKE SA exists before expiring.

When IKE begins negotiations, it first agrees upon the security parameters for its own session. The agreed-upon parameters are then referenced by an SA at each peer. The SA is retained by each peer until the lifetime of the SA expires. Before an SA expires, it can be reused by subsequent IKE negotiations, which can save time when new IP Security (IPSec) SAs are set up.

To save setup time for IPSec, configure a longer IKE SA lifetime. However, shorter lifetimes limit the exposure to attackers of this SA. The longer an SA is used, the more encrypted traffic can be gathered by an attacker and possibly used in an attack.


Note


When your local peer initiates an IKE negotiation between itself and a remote peer, if the lifetimes are not equal, an IKE policy with the shorter lifetime is selected.


Task ID

Task ID

Operations

crypto

read, write

Examples

The following example shows how to configure an IKE policy with an SA lifetime of 600 seconds (all other parameters are set to the defaults):

RP/0/RP0/CPU0:router# configure
RP/0/RP0/CPU0:router(config)# crypto isakmp policy 15
RP/0/RP0/CPU0:router(config-isakmp)# lifetime 600

Related Commands

local-address (keyring)

To limit the scope of an ISAKMP keyring configuration to a local termination address, use the local-address command in keyring configuration mode. To disable the feature, use the no form of this command.

local-address
ip-address

no
local-address
ip-address

Syntax Description

ip-address

IP address to which to bind.

Command Default

If the local-address command is not configured, the ISAKMP keyring is available to all local addresses.

Command Modes

Keyring configuration

Command History

Release

Modification

Release 3.4.0

This command was introduced.

Usage Guidelines

To use this command, you must be in a user group associated with a task group that includes appropriate task IDs. If the user group assignment is preventing you from using a command, contact your AAA administrator for assistance.

Task ID

Task ID

Operations

crypto

read, write

Examples

The following example shows that the scope of the ISAKMP keyring is limited only to IP address 130.40.1.1:

RP/0/RP0/CPU0:router# configure
RP/0/RP0/CPU0:router(config)# crypto keyring vpnkeyring
RP/0/RP0/CPU0:router(config-keyring)# local-address 130.40.1.1
RP/0/RP0/CPU0:router(config-keyring)# pre-shared-key address 0.0.0.0 0.0.0.0 key mykey

Related Commands

Command

Description

crypto isakmp identity

Specifies the identity used by the router when participating in the Internet Key Exchange (IKE) protocol.

crypto keyring

Defines a crypto keyring during IKE authentication.

match identity (ISAKMP policy-set)

To create an SVI tunnel source, use the match identity command in ISAKMP policy-set configuration mode. To remove the identity, use the no form of this command.

match
identity
local-address
IP
address

no
match
identity
local-address
IP
address

Syntax Description

local-address

This creates the SVI tunnel source for a remote peer.

IP address

IP prefix for the SVI tunnel source.

Command Modes

ISAKMP policy-set configuration mode

Command History

Release

Modification

Release 3.6.0

This command was introduced.

Usage Guidelines

To use this command, you must be in a user group associated with a task group that includes appropriate task IDs. If the user group assignment is preventing you from using a command, contact your AAA administrator for assistance.

An ISAKMP profile configuration must have at least one match identity command. The peers are mapped to an ISAKMP profile when their identities are matched (as given in the ID payload of the IKE exchange) against the identities that are defined in the ISAKMP profile. To uniquely map to an ISAKMP profile, no two ISAKMP profiles should match the same identity. If the peer identity is matched in two ISAKMP profiles, the configuration is invalid.

The IP address identified in this command requires a particular preconfigured encryption algorithm and it should be the only one operational.

Task ID

Task ID

Operations

crypto

read, write

Examples

The following example shows how to configure the match identity (ISAKMP policy-set) command:

RP/0/RP0/CPU0:router# configure
RP/0/RP0/CPU0:router(config)# crypto isakmp policy-set ps2
RP/0/RP0/CPU0:router(config-isakmp-pol-set)# policy 60 61
RP/0/RP0/CPU0:router(config-isakmp-pol-set)# match identity local-address 12.13.51.1

Related Commands

match identity (ISAKMP profile)

To match the identity of a peer in an ISAKMP profile, use the match identity command in ISAKMP profile configuration mode. To remove the identity, use the no form of this command.

match
identity
{ group
group-name | address
address
[mask]
vrf
[fvrf] | host
hostname | host
domain
domain-name | user
username | user
domain
domain-name }

no
match
identity
{ group
group-name | address
address
[mask]
vrf
[fvrf] | host
hostname | host
domain
domain-name | user
username | user
domain
domain-name }

Syntax Description

group group-name

Specifies a Unity group that matches identification (ID) type ID_KEY_ID. If RSA signatures are used, the group-name argument matches the organizational unit (OU) field of the distinguished name (DN).

address address

Matches the address argument with the ID type ID_IPV4_ADDR.

mask

The mask argument is used to specify a range of addresses.

vrf

Specifies the front door VPN routing and forwarding (FVRf) of the peer.

fvrf

The fvrf argument matches the address in the front door VPN routing and forwarding (FVRF) Virtual Private Network (VPN) space.

host hostname

Specifies an identity that matches the type ID_FQDN, whose fully qualified domain name (FQDN) ends with the domain name.

host domain domain-name

Specifies an identity that matches type ID_FQDN. The domain name is the same as the domain-name argument.

user username

Specifies an identity that matches the FQDN.

user domain domain-name

Specifies an identity that matches the type ID_USER_FQDN. When the user domain keyword is present, all users having identities of the type ID_USER_FQDN and ending with domain-name are matched.

Command Default

No default behavior or values

Command Modes

ISAKMP profile configuration

Command History

Release

Modification

Release 3.4.0

This command was introduced.

Usage Guidelines

To use this command, you must be in a user group associated with a task group that includes appropriate task IDs. If the user group assignment is preventing you from using a command, contact your AAA administrator for assistance.

An ISAKMP profile configuration must have at least one match identity command. The peers are mapped to an ISAKMP profile when their identities are matched (as given in the ID payload of the IKE exchange) against the identities that are defined in the ISAKMP profile. To uniquely map to an ISAKMP profile, no two ISAKMP profiles should match the same identity. If the peer identity is matched in two ISAKMP profiles, the configuration is invalid.


Note


To configure a tunnel-ipsec interface, you must configure a local ISAKMP profile.


Task ID

Task ID

Operations

crypto

read, write

Examples

The following example shows how to configure matches on a local ISAKMP profile:

RP/0/RP0/CPU0:router# configure
RP/0/RP0/CPU0:router(config)# crypto isakmp profile local tunnel_ipsec
RP/0/RP0/CPU0:router(config-isa-prof)# match identity address 1.1.1.6/32 vrf default
RP/0/RP0/CPU0:router(config-isa-prof-match)# set interface tunnel-ipsec 3001

Related Commands

policy (ISAKMP policy-set)

To specify the routing priority of a preconfigured policy, use the policy command within the ISAKMP policy-set submode. To cancel the priority, use the no variant of this command.

policy
policy
number

no
policy

Syntax Description

policy number

From 1 to 10000, with the low end of the range signifying the highest priority.

Command Modes

ISAKMP policy-set configuration mode

Command History

Release

Modification

Release 3.6.0

This command was introduced.

Usage Guidelines

To use this command, you must be in a user group associated with a task group that includes appropriate task IDs. If the user group assignment is preventing you from using a command, contact your AAA administrator for assistance.

Task ID

Task ID

Operations

crypto

read, write

Examples

The following example shows how to configure a routing policy priority:

RP/0/RP0/CPU0:router# configure
RP/0/RP0/CPU0:router(config)# crypto isakmp policy-set p1
RP/0/RP0/CPU0:router(config-isakmp-pol-set)# policy pol2

Related Commands

pre-shared-key

To define a preshared key for IKE authentication, use the pre-shared-key command in keyring configuration mode. To disable, use the no form of this command.

pre-shared-key
{ address
address
[mask] | hostname
hostname }
key
key

no
pre-shared-key
{ address
address
[mask] | hostname
hostname }
key
key

Syntax Description

address address

Specifies the IP address of the remote peer or a subnet and mask.

mask

(Optional) The mask argument matches the range of the address. The default value is 255.255.255.255.

hostname hostname

Specifies the fully qualified domain name (FQDN) of the peer.

key key

Specifies the preshared key.

Command Modes

Keyring configuration

Command History

Release

Modification

Release 3.4.0

This command was introduced.

Usage Guidelines

To use this command, you must be in a user group associated with a task group that includes appropriate task IDs. If the user group assignment is preventing you from using a command, contact your AAA administrator for assistance.

Task ID

Task ID

Operations

crypto

read, write

Examples

The following example shows how to configure a preshared key using an IP address and hostname:

RP/0/RP0/CPU0:router# configure
RP/0/RP0/CPU0:router(config)# crypto keyring vpnkeyring
RP/0/RP0/CPU0:router(config-keyring)# pre-shared-key address 10.72.23.11 key vpnkey
RP/0/RP0/CPU0:router(config-keyring)# pre-shared-key hostname www.vpn.com key vpnkey

Related Commands

Command

Description

crypto isakmp identity

Specifies the identity used by the router when participating in the Internet Key Exchange (IKE) protocol.

crypto keyring

Defines a crypto keyring during IKE authentication.

rsa-pubkey

To define the Rivest, Shamir, and Adelman (RSA) manual key to be used for encryption or signature during IKE authentication, use the rsa-pubkey command in keyring configuration mode. To disable the feature, use the no form of this command.

rsa-pubkey
{ address
address | name
fqdn }
[ encryption | signature ]

no
rsa-pubkey
{ address
address | name
fqdn }
[ encryption | signature ]

Syntax Description

address address

Specifies the IP address of the RSA public key of the remote peer. The address argument is the IP address of the remote RSA public key of the remote peer that you manually configure.

name fqdn

Specifies the fully qualified domain name (FQDN) of the peer.

encryption

(Optional) Specifies that the manual key is used for encryption.

signature

(Optional) Specifies that the manual key is used for a signature. The signature keyword is the default.

Command Default

The key is used for the signature.

Command Modes

Keyring configuration

Command History

Release

Modification

Release 3.4.0

This command was introduced.

Usage Guidelines

To use this command, you must be in a user group associated with a task group that includes appropriate task IDs. If the user group assignment is preventing you from using a command, contact your AAA administrator for assistance.

Use the rsa-pubkey command to enter public key configuration mode. Use this command when you need to manually specify RSA public keys of other IP Security (IPSec) peers. You need to specify the keys of other peers when you configure RSA encrypted nonces as the authentication method in an IKE policy at your peer router.

When you finish specifying the RSA key, you must return to global configuration mode by entering quit .

Task ID

Task ID

Operations

crypto

read, write

Examples

The following example shows that the RSA manual key of an IPSec peer has been specified:

RP/0/RP0/CPU0:router# configure
RP/0/RP0/CPU0:router(config)# crypto keyring vpnkeyring
RP/0/RP0/CPU0:router(config-keyring)# rsa-pubkey name host.vpn.com
RP/0/RP0/CPU0:router(config-pubkey)# key-string 005C300D 06092A86 4886F70D 01010105
005C300D 06092A86 4886F70D 01010105
00034B00 30480241 00C5E23B 55D6AB22
04AEF1BA A54028A6 9ACC01C5 129D99E4
64CAB820 847EDAD9 DF0B4E4C 73A05DD2
BD62A8A9 FA603DD2 E2A8A6F8 98F76E28
D58AD221 B583D7A4 71020301 0001
quit

Related Commands

Command

Description

address

Specifies the IP address for the Rivest, Shamir, and Adelman (RSA) public key of the remote peer you manually configure.

crypto keyring

Defines a crypto keyring during IKE authentication.

key-string (IKE)

Specifies the Rivest, Shamir, and Adelman (RSA) public key of a remote peer manually.

self-identity

To define the identity that the local IKE uses to identify itself to the remote peer, use the self-identity command in ISAKMP profile configuration mode. To remove the ISAKMP identity that was defined for the IKE, use the no form of this command.

self-identity
{ address | fqdn | user-fqdn
user-fqdn }

no
self-identity
{ address | fqdn | user-fqdn
user-fqdn }

Syntax Description

address

Specifies the IP address of the local endpoint.

fqdn

Specifies the fully qualified domain name (FQDN) of the host.

user-fqdn user-fqdn

Specifies the user FQDN that is sent to the remote endpoint.

Command Default

If no ISAKMP identity is defined in the ISAKMP profile configuration, global configuration is the default.

Command Modes

ISAKMP profile configuration

Command History

Release

Modification

Release 3.4.0

This command was introduced.

Usage Guidelines

To use this command, you must be in a user group associated with a task group that includes appropriate task IDs. If the user group assignment is preventing you from using a command, contact your AAA administrator for assistance.

If the self-identity command is not defined, IKE uses the globally configured value.

Task ID

Task ID

Operations

crypto

read, write

Examples

The following example shows that the IKE identity is the user FQDN «user@vpn.com»:

RP/0/RP0/CPU0:router# configure
RP/0/RP0/CPU0:router(config)# crypto isakmp profile vpnprofile
RP/0/RP0/CPU0:router(config-isa-prof)# self-identity user-fqdn user@vpn.com

Related Commands

set interface tunnel-ipsec

To predefine the virtual interface instance when IKE negotiates for tunnel mode IPSec service associations (SAs) for the traffic that is locally sourced or terminated, use the set interface tunnel-ipsec command in ISAKMP profile match configuration mode. To disable the feature, use the no form of this command.

set
interface
tunnel-ipsec
intf-index

no
set
interface
tunnel-ipsec
intf-index

Syntax Description

intf-index

Specifies the virtual interface index. The range is from 0 to 4294967295.

Command Default

No default behavior or values

Command Modes

ISAKMP profile match configuration

Command History

Release

Modification

Release 3.4.0

This command was introduced.

Usage Guidelines

To use this command, you must be in a user group associated with a task group that includes appropriate task IDs. If the user group assignment is preventing you from using a command, contact your AAA administrator for assistance.

When the local endpoint is the IKE responder, the predefined interface is found according to the peer’s identity. When the local endpoint is the IKE initiator, the predefined interface is used to find the appropriate ISAKMP profile to be used. Therefore, a virtual interface cannot be predefined in more than one ISAKMP profile.


Note


The set interface tunnel-ipsec command is used only for local ISAKMP profiles.


Task ID

Task ID

Operations

crypto

read, write

Examples

The following example shows how to predefine the interface instance:

RP/0/RP0/CPU0:router# configure
RP/0/RP0/CPU0:routerr(config)# crypto isakmp profile local vpnprofile
RP/0/RP0/CPU0:router(config-isa-prof)# match identity group vpngroup
RP/0/RP0/CPU0:router(config-isa-prof-match)# set interface tunnel-ipsec 50

Related Commands

set ipsec-profile

To predefine the IPSec profile instance when IKE negotiates for transport mode IPSec service associations (SAs) for the traffic that is locally sourced or terminated, use the set ipsec-profile command in ISAKMP profile match configuration mode. To disable the feature, use the no form of this command.

set
ipsec-profile
profile-name

no
set
ipsec-profile
profile-name

Syntax Description

profile-name

Name of the IPsec profile.

Command Modes

ISAKMP profile match configuration

Command History

Release

Modification

Release 3.4.0

This command was introduced.

Usage Guidelines

To use this command, you must be in a user group associated with a task group that includes appropriate task IDs. If the user group assignment is preventing you from using a command, contact your AAA administrator for assistance.

The IPSec profile must be predefined by using the set ipsec-profile or the set interface tunnel-ipsec command when transport mode IPSec SAs are negotiated. Otherwise, the IKE SA cannot be established.

When the local endpoint is the IKE responder, the predefined interface is found according to the peer’s identity. When the local endpoint is the IKE initiator, the predefined interface is used to find the appropriate ISAKMP profile to be used. Therefore, a virtual interface cannot be predefined in more than one ISAKMP profile.


Note


The profile for the identity is determined based on the selected virtual interface, which, in this case, can only be tunnel-ipsec, because only local ISAKMP profiles are supported.


When the local endpoint is the IKE initiator, the profile or interface configured is used to select the correct ISAKMP profile.

Task ID

Task ID

Operations

crypto

read, write

Examples

The following example shows how to predefine the IPSec profile instance:

RP/0/RP0/CPU0:router# configure
RP/0/RP0/CPU0:router(config)# crypto isakmp profile local vpnprofile 
RP/0/RP0/CPU0:router(config-isa-prof)# match identity group vpngroup
RP/0/RP0/CPU0:router(config-isa-prof-match)# set ipsec-profile myprofile

Related Commands

show crypto isakmp call admission statistics

To monitor the Call Admission Control (CAC) statistics of the IKE protocol, use the show crypto isakmp call admission statistics command in EXEC mode.

show
crypto
isakmp
call
admission
statistics

Syntax Description

This command has no keywords or arguments.

Command History

Release

Modification

Release 3.4.0

This command was introduced.

Usage Guidelines

To use this command, you must be in a user group associated with a task group that includes appropriate task IDs. If the user group assignment is preventing you from using a command, contact your AAA administrator for assistance.

Task ID

Task ID

Operations

crypto

read

Examples

The following example shows how to display the configuration for the show crypto isakmp call admission statistics command:

RP/0/RP0/CPU0:router# show crypto isakmp call admission statistics

---------------------------------------------------------------------
               Crypto Call Admission Control Statistics
---------------------------------------------------------------------
IKE Active SA Limit: 1, IKE In-Negotiation SA limit: 2
Total CPU usage limit: 100, IKE CPU usage limit: 100
Total IKE SA Count: 0, active: 0, negotiating: 0
Incoming IKE Calls: 24      , accepted 24      , rejected 0
Outgoing IKE Calls: 16      , accepted 6       , rejected 10
Total Calls: 40
Rejected IKE Calls: 10, resources low 0, limit exceeded 10

This table describes the significant fields shown in the display.

Table 1 show crypto isakmp call admission statistics Field Descriptions

Field

Description

IKE Active SA Limit

Default value of 0 has no limitations.

In-Negotiation SA limit

Default value is 1000.

Total IKE SA Count

Number of IKE SAs.

active

Number of active SAs.

negotiating

Number of SA requests being negotiated.

Incoming IKE Calls

Number of incoming IKE SA requests. The number of incoming IKE calls equals to the total of accepted plus rejected requests.

accepted

Number of accepted incoming or outgoing IKE SA requests.

rejected

Number of rejected incoming or outgoing IKE SA requests.

Outgoing IKE Calls

Number of outgoing IKE SA requests. The number of outgoing IKE calls equals to the total of accepted plus rejected requests.

Total Calls

Total calls equals to the number of incoming IKE calls plus outgoing IKE calls.

Rejected IKE Calls

Number of IKE requests that were rejected. The number of rejected IKE calls equals to the total number of resources low plus limit exceeded.

resources low

Number of IKE requests that were rejected because system resources were low or because the preconfigured system resource limit was exceeded.

limit exceeded

Number of IKE SA requests that were rejected because the SA limit has been reached.

Related Commands

show crypto isakmp errors

To display the Internet Security Association and Key Management Protocol (ISAKMP) error that occurred during tunnel establishment, use the show crypto isakmp errors command in EXEC mode.

show
crypto
isakmp
errors

Syntax Description

This command has no keywords or arguments.

Command History

Release

Modification

Release 3.5.0

This command was introduced.

Usage Guidelines

To use this command, you must be in a user group associated with a task group that includes appropriate task IDs. If the user group assignment is preventing you from using a command, contact your AAA administrator for assistance.

Task ID

Task ID

Operations

crypto

read

Examples

The following sample output is from the show crypto isakmp errors command:

RP/0/RP0/CPU0:router# show crypto isakmp errors

Control Plane Errors
---------------------
ERR NO MEMORY.....................................0
INVALID CERT......................................0
CRYPTO FAILURE....................................0
SA NOT AUTH.......................................0
AUTHENTICATION FAILED.............................0
GROUP AUTHOR FAILED...............................0
USER AUTHEN REJECTED..............................0
LOCAL ADDRESS FAILURE.............................0
FAILED TO CREATE SKEYID...........................0
RSA PUBLIC KEY NOT FOUND..........................0
RETRANSMITION LIMIT...............................0
MALFORMED MESSAGE.................................0
QUICK MODE TIMER EXPIRED..........................0
KEY NOT FOUND IN PROFILE..........................0
PROFILE NOT FOUND.................................0
PRESHARED KEY NOT FOUND...........................0
PHASE2 PROPOSAL NOT CHOSEN........................0
POLICY MISMATCH...................................0
NO POLICY FOUND...................................0
PACKET PROCESS FAILURE............................0

Warnings
---------
CERT DOESNT MATCH ID..............................0
CERT ISNT TRUSTED ROOT............................0
PACKET NOT ENCRYPTED..............................0
UNRELIABLE INFO MSG...............................0
NO SA.............................................0
BAD DOI SA........................................0
UNKNOWN EXCHANGE TYPE.............................0
OUTGOING PKT TOO BIG..............................0
INCOMING PKT TOO BIG..............................0

Informational
--------------
CAC DROPS.........................................0
DEFAULT POLICY ACCEPTED...........................0

This table describes the significant fields shown in the display.

Table 2 show crypto isakmp errors Field Descriptions

Field

Description

ERR NO MEMORY

A memory allocation failure has occurred in which the process cannot automatically recover.

The process must be restarted to ensure correct operation. If memory is repeatedly exhausted, you can upgrade to a larger memory configuration.

INVALID CERT

The certificate, which is given by the remote peer, has either been revoked or expired (certificate invalid) or the signature check on the certificate failed (bad signature).

We recommend to contact the CA of the remote peer to report a possible bad CA certificate.

CRYPTO FAILURE

IKE found a failure that is returned from encryption or decryption service.

We recommend to contact the remote peer’s administrator.

SA NOT AUTH

The IKE security association with the remote peer was not authenticated; however, the peer attempted to begin a Quick Mode exchange. The exchange must be done only with an authenticated security association.

We recommend to contact the peer’s administrator.

AUTHENTICATION FAILED

The IKE process was unable to authenticate the security association with the remote peer.

We recommend to contact the peer’s administrator.

GROUP AUTHOR FAILED

Group authorization failed.

We recommend to check the connectivity for AAA.

USER AUTHEN REJECTED

Phase 1.5 (Xauth) processing failed with the peer.

You must ensure that the password, which was delivered, matches the client. Otherwise, contact Cisco Technical Support with the exact log message that was received.

LOCAL ADDRESS FAILURE

Failed to allocate IP address for the client.

You must ensure that the IP local pool is defined and contains at least one free address. In addition, ensure that the specific pool is assigned to the proper ISAKMP profile from the show crypto isakmp profile command. Otherwise, contact Cisco Technical Support with the exact log message that was received.

FAILED TO CREATE SKEYID

Failed to generate SKEYID.

We recommend to contact Cisco Technical Support.

RSA PUBLIC KEY NOT FOUND

Failed to query the RSA key.

You can check the subject name in the certificate.

RETRANSMITION LIMIT

Retransmission limit exceeded.

We recommend to contact your administrator.

MALFORMED MESSAGE

A quick sanity check is done on all received ISAKMP messages to verify that all component payload types are valid, and that the sum of their individual lengths equals to the total length of the received message. This message failed the sanity check.

The continuous bad messages can imply the denial of a service attack.

We recommend to contact the peer’s administrator.

QUICK MODE TIMER EXPIRED

We cannot always wait before we start Quick Mode and initiate Phase 2.

Most likely, the reason for failing to start Phase 2 is that the process failed to complete Phase I. If so, it should have also logged another message that should appear immediately before this one.

KEY NOT FOUND IN PROFILE

In Main Mode, the ID payloads are exchanged only in MM5 and MM6. Since keyring material is needed in earlier stages of the negotiation, it is looked up based on peer address. The error is seen when the selected keyring appears to not match the keyring configured under the ISAKMP profile for that peer.

You must ensure that the keyring in which the key exist is attached to the ISAKMP profile.

PROFILE NOT FOUND

The following explanations are listed:

  • No ISAKMP profile is found that matches the peer identity. This is applicable only to RESPONDER mode.
  • No ISAKMP profile is found that matches the interface name. This is applicable only to INITIATOR mode.
  • Peer identity does not match the ISAKMP profile that is associated with the interface. This is applicable only to INITIATOR mode.

The following recommendations are listed:

  • You must ensure an ISAKMP profile exists for the peer match-id.
  • You must ensure that the ISAKMP profile is attached to the proper interface.
  • You must ensure that the ISAKMP profile, which is attached to the interface, matches the peers identity.

PRESHARED KEY NOT FOUND

Failed to find preshared key.

We recommend to contact the administrator.

PHASE2 PROPOSAL NOT CHOSEN

Phase 2 parameters negotiation failed with the peer.

We recommend to contact the peer’s administrator.

POLICY MISMATCH

Phase 1policy parameters negotiation failed with peer.

We recommend to contact the peer’s administrator.

NO POLICY FOUND

The peer key failed to derive through either of the following ways:

  • Preshared keys
  • RSA keys
  • Certificates

We recommend to contact the administrator.

PACKET PROCESS FAILURE

The error message implies a severe error condition, which likely resulted from an internal error.

We recommend to contact Cisco Technical Support.

CERT DOESNT MATCH ID

The peers claimed that the identity does not match what we can gather from the certificate.

If the session does not come up, you can contact the remote peer or the administrator.

CERT ISNT TRUSTED ROOT

During IKE Phase I signature verification, the initiator sends a list of the CA certificates. This warning is printed by the responder if none of the CAs in the list is a trusted root.

Note   

This is not necessarily an error, as there can be multiple cert-req payloads.

If the session does not come up, you can contact the remote peer or the administrator.

PACKET NOT ENCRYPTED

The received packet should have been encrypted by the peer but it was not.

We recommend to contact the remote peer’s administrator.

UNRELIABLE INFO MSG

The received INFO message before the peer is authenticated, which is why it called unreliable.

We recommend to contact the remote peer’s administrator.

NO SA

No security association exists for this packet and it is not an initial offer from the peer to establish one. These errors can imply the denial of a service attack.

We recommend to contact the remote peer or the administrator.

BAD DOI SA

The DOI field in a SA offer is needed for message parsing. SA offer with unknown DOI can’t be parsed.

If the situation persists, you can contact the remote peer’s administrator.

UNKNOWN EXCHANGE TYPE

IKE performs actions on messages that are based on defined exchanges. A message is received with an unknown exchange.

If the problem appears to be more than a transient one, you can contact the peer’s administrator.

OUTGOING PKT TOO BIG

Trying to send an ISAKMP packet that is above the maximum UDP packet size allowed, which can happen if an extremely large number of IKE policies were being proposed by the initiator.

You can try to reduce the number of ISAKMP policies configured.

INCOMING PKT TOO BIG

The packet size is limited to 3K, which the peer sends out long length info that forces a large buffer allocation, for example, Denial-of-Service (DoS).

We recommend that you contact the remote peer or the administrator.

CAC DROPS

The Call Admission Control (CAC) policy is configured on the device. Consequently, an IKE SA request was denied due to the reason described in the error message.

Depending on the reason that the request was denied, you can either reduce the load on the system so that it can handle new IKE SA requests, or increase the maximum allowed IKE sessions if more are needed.

DEFAULT POLICY ACCEPTED

The default policy is being used because the local configured policies did not match with the peer’s policies.

You can check if this is indeed the desired ISAKMP policy to use. To avoid using the default policy, you can reconfigure the local policy to match with the peer’s policy.

Related Commands

Command

Description

clear crypto isakmp errors

Clears the statistics for the ISAKMP errors.

show crypto isakmp key

To display the Internet Security Association and Key Management Protocol (ISAKMP) preshared keys for a router, use the show crypto isakmp key command in EXEC mode.

Syntax Description

This command has no keywords or arguments.

Command History

Release

Modification

Release 2.0

This command was introduced.

Usage Guidelines

To use this command, you must be in a user group associated with a task group that includes appropriate task IDs. If the user group assignment is preventing you from using a command, contact your AAA administrator for assistance.

Task ID

Task ID

Operations

crypto

read

Examples

The following example shows how to display the IP hostname and address preshared keys:

RP/0/RP0/CPU0:router# show crypto isakmp key

Keyring         Hostname/Address      Preshared Key
K1              3.3.3.1               rd26
K2              5.5.5.5               ex22
K2              tzvi.cisco.com        ppp

This table describes the significant fields shown in the display.

Table 3 show crypto isakmp key Field Descriptions

Field

Description

Hostname/Address

IP hostname or address of the router.

Preshared Key

ISAKMP preshared key for the router.

show crypto isakmp peers

To display peer structures, use the show crypto isakmp peers command in EXEC mode.

show
crypto
isakmp
peers
[ ip-address | vrf
vrf-name ]

Syntax Description

ip-address

(Optional) IP address of the peer.

vrf vrf-name

(Optional) Specifies the front door VRF of the peer. The vrf-name argument is the name assigned to a VRF.

Command History

Release

Modification

Release 3.4.0

This command was introduced.

Usage Guidelines

To use this command, you must be in a user group associated with a task group that includes appropriate task IDs. If the user group assignment is preventing you from using a command, contact your AAA administrator for assistance.

Task ID

Task ID

Operations

crypto

read

Examples

The following example shows sample output from the show crypto isakmp peers command:

RP/0/RP0/CPU0:router# show crypto isakmp peers

Peer: 10.0.83.1   Port: 4500   Local: 30.0.0.4   vrf: default
  UDP encapsulate: True
  SA information:
    Connection ID: 1
    State: QM_IDLE
    Phase 1 ID: DER_ASN1_DN srbu

This table describes the significant fields shown in the display.

Table 4 show crypto isakmp peers Field Descriptions

Field

Description

Connection ID

Internet Key Exchange (IKE) ID.

State

Output display for the various states. For a detailed description of each state, see Table 2.

Phase1 ID

Internet Key Exchange (IKE) ID.

Related Commands

show crypto isakmp policy

To display the parameters for each Internet Key Exchange (IKE) policy, use the show crypto isakmp policy command in EXEC mode.

show
crypto
isakmp
policy

Syntax Description

This command has no keywords or arguments.

Command History

Release

Modification

Release 2.0

This command was introduced.

Usage Guidelines

To use this command, you must be in a user group associated with a task group that includes appropriate task IDs. If the user group assignment is preventing you from using a command, contact your AAA administrator for assistance.

Task ID

Task ID

Operations

crypto

read

Examples

The following sample output is from the show crypto isakmp policy command after two IKE policies have been configured (with priorities 15 and 20, respectively):

RP/0/RP0/CPU0:router# show crypto isakmp policy

Protection suite priority 15
    encryption algorithm: DES - Data Encryption Standard (56 bit keys)
    hash algorithm: Message Digest 5
    authentication method:  Rivest-Shamir-Adleman Signature
    Diffie-Hellman Group: #2 (1024 bit)
    lifetime: 5000 seconds, no volume limit
Protection suite priority 20
    encryption algorithm: DES - Data Encryption Standard (56 bit keys)
    hash algorithm: Secure Hash Standard
    authentication method: preshared Key
    Diffie-Hellman Group: #1 (768 bit)
    lifetime: 10000 seconds, no volume limit
Default protection suite
    encryption algorithm:  DES - Data Encryption Standard (56 bit keys)
    hash algorithm: Secure Hash Standard
    authentication method: Rivest-Shamir-Adleman Signature
    Diffie-Hellman Group: #1 (768 bit)
    lifetime: 86400 seconds, no volume limit

Note


Although the output shows “no volume limit” for the lifetimes, you can currently configure only a time lifetime (such as 86,400 seconds); volume limit lifetimes are not used.


This table describes the significant fields shown in the display.

Table 5 show crypto isakmp policy Field Descriptions

Field

Description

encryption algorithm

Encryption algorithm within the IKE policy.

hash algorithm

Hash algorithm within the IKE policy.

authentication method

Authentication method used in the IKE policy.

Diffie-Hellman group

Diffie-Hellman group identifier in the IKE policy.

lifetime

Length of time (in seconds) the security association (SA) exists before expiring.

Related Commands

show crypto isakmp profile

To list all the ISAKMP profiles that are defined on a router, use the show crypto isakmp profile command in EXEC mode.

show
crypto
isakmp
profile
[ interface
intf-name | ipsec-profile
ipsec-prof-name | tag
isakmp-prof-name ]

Syntax Description

interface intf-name

(Optional) Displays the ISAKMP profile by the interface for the IPSec match ID.

ipsec-profile ipsec-prof-name

(Optional) Displays the ISAKMP profile by the IPSec profile for the IPSec match ID.

tag isakmp-prof-name

(Optional) Displays the ISAKMP profile by name.

Command History

Release

Modification

Release 3.4.0

This command was introduced.

Usage Guidelines

To use this command, you must be in a user group associated with a task group that includes appropriate task IDs. If the user group assignment is preventing you from using a command, contact your AAA administrator for assistance.

Task ID

Task ID

Operations

crypto

read

Examples

The following sample output is from the show crypto isakmp profile command:

RP/0/RP0/CPU0:router# show crypto isakmp profile

ISAKMP Profile: isakmp-prof2
   Keyring(s): kr2
   Identities matched are:
      Address: 10.0.2.1 255.255.255.255 fvrf: green
         Interface: service-ipsec2

ISAKMP Profile: isakmp-prof1
   Keyring(s): kr1
   Identities matched are:
      Group: srbu
         Interface: service-gre1

This table describes the fields for the show crypto isakmp profile command.

Table 6 show crypto isakmp profile Field Descriptions

Field

Description

ISAKMP Profile

Name of the ISAKMP profile.

Keyring(s)

Name for keyring that must match the keyring name that was defined in the global configuration.

Identities matched are

All identities that the ISAKMP profile can match.

Related Commands

Command

Description

crypto isakmp profile

Defines an ISAKMP profile and audits IPSec user sessions.

keyring

Configures a keyring with an ISAKMP profile.

show crypto isakmp sa

To display all current Internet Key Exchange (IKE) security associations (SAs) at a peer, use the show crypto isakmp sa command in EXEC mode.

show
crypto
isakmp
sa
[ connection
ID ]

Syntax Description

connection ID

(Optional) IKE SA identifier. The range is from 1 to 65535.

Command History

Release

Modification

Release 2.0

This command was introduced.

Release 3.4.0

The vrf field was added in the sample output.

Release 3.5.0

The command syntax was updated to include the following keywords and arguments:

  • connection ID argument
  • peer keyword and remote IP address argument
  • fvrf keyword and vrf name argument
  • local keyword and IP address argument
  • ivrf keyword and ivrf name argument
  • detail keyword
  • count keyword

Release 3.6.0

The connection ID range was updated.

Release 3.8.0

All keywords and arguments with the exception of the connection ID argument were removed.

Usage Guidelines

To use this command, you must be in a user group associated with a task group that includes appropriate task IDs. If the user group assignment is preventing you from using a command, contact your AAA administrator for assistance.

Use the connection ID argument to display the list of identifiers.’

Task ID

Task ID

Operations

crypto

read

Examples

The following sample output is from the show crypto isakmp sa command, after IKE negotiations have been successfully completed between two peers:

            RP/0/RP0/CPU0:router# show crypto isakmp sa vrf
            dst src state conn-id nodeid ---------- ------------ ------------ --------- -------
            ------ default 30.0.0.4 10.0.83.1 QM_IDLE 1 0 

This table describes the significant fields shown in the display.

Table 7 show crypto isakmp sa Field Descriptions

Field

Description

vrf

Virtual route forwarding (VRF) for the ISAKMP SA details per VRF.

dst

Destination IP address.

src

Source IP address.

conn-id

Connection ID.

nodeid

Node ID.

This table shows the various states that may be displayed in the output of the show crypto isakmp sa command. When an Internet Security Association and Key Management Protocol (ISAKMP) SA exists, it is most likely in its quiescent state (QM_IDLE). For long exchanges, some MM_xxx states may be observed.

Table 8 Mode States

State: Main Mode Exchange

Explanation

MM_NO_STATE

The ISAKMP SA has been created, but nothing else has happened yet. It is “larval” at this stage—there is no state.

MM_SA_SETUP

The peers have agreed on parameters for the ISAKMP SA.

MM_KEY_EXCH

The peers have exchanged Diffie-Hellman public keys and have generated a shared secret. The ISAKMP SA remains unauthenticated.

MM_KEY_AUTH

The ISAKMP SA has been authenticated. If the router initiated this exchange, this state makes the transition immediately to QM_IDLE, and a quick mode exchange begins.

State: Aggressive Mode Exchange Explanation

AG_NO_STATE

The ISAKMP SA has been created but nothing else has happened yet. It is “larval” at this stage—there is no state.

AG_INIT_EXCH

The peers have done the first exchange in aggressive mode, but the SA is not authenticated.

AG_AUTH

The ISAKMP SA has been authenticated. If the router initiated this exchange, this state makes the transition immediately to QM_IDLE, and a quick mode exchange begins.

State: Quick Mode Exchange Explanation

QM_IDLE

The ISAKMP SA is idle. It remains authenticated with its peer and may be used for subsequent quick mode exchanges. It is in a quiescent state.

Related Commands

show crypto isakmp stats

To display the information for ISAKMP global statistics, use the show crypto isakmp stats command in EXEC mode.

show
crypto
isakmp
stats
[ vrf
vrf-name ]

Syntax Description

vrf vrf-name

(Optional) Specifies the ISAKMP statistics per VPN routing and forwarding (VRF) instance. The vrf-name argument is the name assigned to a VRF.

Command History

Release

Modification

Release 3.5.0

This command was introduced.

Usage Guidelines

To use this command, you must be in a user group associated with a task group that includes appropriate task IDs. If the user group assignment is preventing you from using a command, contact your AAA administrator for assistance.

Use the show crypto isakmp stats command to display the ISAKMP statistics per VRF instance. If the VRF instance is not specified, the default for the statistics of the VRF instance is shown.

The following global statistics are printed from the show crypto isakmp stats command:

  • Active ISAKMP SAs
  • ISAKMPs that are currently being negotiated
  • Maximum number of concurrent ISAKMP SAs
  • Maximum number of concurrent established SAs
  • Number of expired SAs .

Task ID

Task ID

Operations

crypto

read

Examples

The following example displays sample output from the show crypto isakmp stats command:

RP/0/RP0/CPU0:router# show crypto isakmp stats

VRF ISAKMP statistics:

        Active Tunnels:                 0
        Previous Tunnels:               0

        In Octets:                      0
        In Packets:                     0
        In Drop Packets:                0
        In Notifys Messages:            0
        In Phase2 Exchanges:            0
        In Phase2 Exchange Invalids:    0
        In Phase2 Exchange Rejects:     0
        In Phase2 SA Delete Requests:   0

        Out Octets:                     0
        Out Packets:                    0
        Out Drop Packets:               0
        Out Notifys Messages:           0
        Out Phase2 Exchanges:           0
        Out Phase2 Exchange Invalids:   0
        Out Phase2 Exchange Rejects:    0
        Out Phase2 SA Delete Requests:  0
          
        Initiator Tunnels:              0
        Initiator Tunnel Setup Fails:   0
        Responder Tunnel Setup Fails:   0
        Sys Cap Fails:                  0
        Auth Failures:                  0
        Decryption Fails:               0
        Hash Valid Fails:               0
        No SA Fails:                    0

This table describes the significant fields shown in the display.

Table 9 show crypto isakmp stats Field Descriptions

Field

Description

Active Tunnels

The number of currently active IPSec Phase-1 IKE Tunnels.

Previous Tunnels

The total number of previously active IPSec Phase-1 IKE Tunnels.

In Octets

The total number of octets received by all currently and previously active IPSec Phase-1 IKE Tunnels.

In Packets

The total number of packets received by all currently and previously active IPSec Phase-1 IKE Tunnels.

In Phase2 Exchanges

The total number of IPSec Phase-2 exchanges received by all currently and previously active IPsec Phase-1 IKE Tunnels.

In Phase2 Exchange Invalids

The total number of IPSec Phase-2 exchanges that were received and found to be invalid by all currently and previously active IPSec Phase-1 IKE Tunnels.

In Phase2 Exchange Rejects

The total number of IPSec Phase-2 exchanges that were received and rejected by all currently and previously active IPSec Phase-1 IKE Tunnels.

In Phase2 SA Delete Requests

The total number of IPSec Phase-2 security association delete requests received by all currently and previously active and IPSec Phase-1 IKE Tunnels.

Out Octets

The total number of octets sent by all currently and previously active and IPSec Phase-1 IKE Tunnels.

Out Packets

The total number of packets sent by all currently and previously active and IPSec Phase-1 Tunnels.

Out Drop Packets

The total number of packets that were dropped during send processing by all currently and previously active IPsec Phase-1 IKE Tunnels.

Out Notifys Messages

The total number of notifications that are sent by all currently and previously active IPSec Phase-1 IKE Tunnels.

Out Phase2 Exchanges

The total number of IPSec Phase-2 exchanges which were sent by all currently and previously active IPSec Phase-1 IKE Tunnels.

Out Phase2 Exchange Invalids

The total number of IPSec Phase-2 exchanges that were sent and found to be invalid by all currently and previously active IPSec Phase-1 Tunnels.

Out Phase2 Exchange Rejects

The total number of IPSec Phase-2 exchanges that were sent and rejected by all currently and previously active IPSec Phase-1 IKE Tunnels.

Out Phase2 SA Delete Requests

The total number of IPSec Phase-2 SA delete requests that are sent by all currently and previously active IPSec Phase-1 IKE Tunnels.

Initiator Tunnels

The total number of IPSec Phase-1 IKE Tunnels that were locally initiated.

Initiator Tunnel Setup Fails

The total number of IPSec Phase-1 IKE Tunnels that were locally initiated and failed to activate.

Responder Tunnel Setup Fails

The total number of IPSec Phase-1 IKE Tunnels that were remotely initiated and failed to activate.

Sys Cap Fails

The total number of system capacity failures that occurred during processing of all current and previously active IPSec Phase-1 IKE Tunnels.

Auth Failures

The total number of authentications that ended in failure by all current and previous IPSec Phase-1 IKE Tunnels.

Decryption Fails

The total number of decryptions that ended in failure by all current and previous IPSec Phase-1 IKE Tunnels.

Hash Valid Fails

The total number of hash validations that ended in failure by all current and previous IPSec Phase-1 IKE Tunnels.

No SA Fails

The total number of nonexistent Security Association in failures that occurred during processing of all current and previous IPSec Phase-1 IKE Tunnels.

show crypto key pubkey-chain rsa

To display the Rivest, Shamir, and Adelman (RSA) public keys stored on your router for the peer, use the show crypto key pubkey-chain rsa command in EXEC mode.

show
crypto
key
pubkey-chain
rsa
[ name
key-name | address
key-address ]

Syntax Description

name key-name

(Optional) Displays the name of a particular public key.

address key-address

(Optional) Displays the address of a particular public key.

Command Default

All RSA public keys stored on your router is displayed.

Command History

Release

Modification

Release 2.0

This command was introduced.

Usage Guidelines

To use this command, you must be in a user group associated with a task group that includes appropriate task IDs. If the user group assignment is preventing you from using a command, contact your AAA administrator for assistance.

Use this command to display RSA public keys stored on your router. The display includes the RSA public keys for the peer that were manually configured at your router and keys received by your router through other means (such as by a certificate, if certification authority support is configured).

If a router reboots, any public key derived by certificates are lost because the router asks for certificates again, at which time the public key is derived again.

Use the name or address keyword to display details about a particular RSA public key stored on your router.

If no keyword is used, this command displays a list of all RSA public keys stored on your router.

Task ID

Task ID

Operations

crypto

read

Examples

The following sample output is from the show crypto key pubkey-chain rsa command:

RP/0/RP0/CPU0:router# show crypto key pubkey-chain rsa

Codes: M - Manually Configured, C - Extracted from certificate

Code Usage      IP-Address        VRF             Keyring      Name
M    Encrypt                                      K1           example.cisco.com
M    Signing    5.5.5.5           green           K2

The following example shows manually configured special-usage RSA public keys for the peer named somerouter. This example also shows three keys obtained from peer certificates: two special-usage keys for peer routerA and a general-purpose key for peer routerB.

Certificate support is used in the example; if certificate support were not in use, none of the peer keys would show “C” in the Code column, and would all need to be manually configured.

This table describes the significant fields shown in the display.

Table 10 show crypto key pubkey-chain rsa Field Descriptions

Field

Description

Code

RSA public keys that were manually configured on your router (M) and keys received by your router through other means, such as by a certificate (C).

Usage

Type of RSA keys generated.

IP-address

IP address of the local or remote peer for which RSA keys are being configured.

VRF

The virtual route forwarding (VRF) of the keyring.

Keyring

Name of the crypto keyring. The global keys are listed in the default keyring.

Name

Name of the local or remote peer.

The following sample output is from the show crypto key pubkey-chain rsa command for the name keyword that names the public key as somerouter.example.com:

RP/0/RP0/CPU0:router# show crypto key pubkey-chain rsa name somerouter.example.com

Key name: somerouter.example.com
Key address: 10.0.0.1
 Usage: Signature Key
 Source: Manual
 Data:
  305C300D 06092A86 4886F70D 01010105 00034B00 30480241 00C5E23B 55D6AB22 
  04AEF1BA A54028A6 9ACC01C5 129D99E4 64CAB820 847EDAD9 DF0B4E4C 73A05DD2 
  BD62A8A9 FA603DD2 E2A8A6F8 98F76E28 D58AD221 B583D7A4 71020301 0001

Key name: somerouter.example.com
Key address: 10.0.0.1
 Usage: Encryption Key
 Source: Manual
 Data:
  00302017 4A7D385B 1234EF29 335FC973 2DD50A37 C4F4B0FD 9DADE748 429618D5
  18242BA3 2EDFBDD3 4296142A DDF7D3D8 08407685 2F2190A0 0B43F1BD 9A8A26DB
  07953829 791FCDE9 A98420F0 6A82045B 90288A26 DBC64468 7789F76E EE21

Note


The Source field in the example indicates “Manual,” meaning that the keys were manually configured on the router, not received in the certificate from the peer.


The following sample output is from the show crypto key pubkey-chain rsa command for address 192.168.10.3:

RP/0/RP0/CPU0:router# show crypto key pubkey-chain rsa address 192.168.10.3 

Key name: routerB.example.com
Key address: 192.168.10.3
 Usage: General Purpose Key
 Source: Certificate
 Data:
  0738BC7A 2BC3E9F0 679B00FE 53987BCC 01030201 42DD06AF E228D24C 458AD228
  58BB5DDD F4836401 2A2D7163 219F882E 64CE69D4 B583748A 241BED0F 6E7F2F16
  0DE0986E DF02031F 4B0B0912 F68200C4 C625C389 0BFF3321 A2598935 C1B1

The Source field in the example indicates “Certificate,” meaning that the keys were received by the router by way of the certificate from the other router.

show crypto session

To display status information for active crypto sessions, use the show crypto session command in EXEC mode.

show
crypto
session
[ detail | fvrf
fvrf-name
[detail] | group
group
name | groups | interface
interface-name | ivrf
ivrf-name | local
IP
address
[ fvrf
fvrf-name | detail ] | profile
profile
name
[detail] | remote
IP-address
[ detail | port
remote-port | fvrf
fvrf-name ] | user
username
[detail] | users ]

Syntax Description

detail

(Optional) Provides more detailed information about the session, such as the capability of the Internet Key Exchange (IKE) security association (SA), connection ID, remaining lifetime of the IKE SA, inbound or outbound encrypted or decrypted packet number of the IP Security (IPSec) flow, dropped packet number, and kilobyte-per-second lifetime of the IPSec SA.

fvrf vrf-name

(Optional) Displays status information about the front door virtual routing and forwarding (FVRF) session. The fvrf-name argument is the name assigned to a FVRF.

group group name

(Optional) Displays the usage for the group identity name that is currently active on the Virtual Private Network (VPN) device. The group name argument is the identity name for the group.

groups

(Optional) Displays the usage for all the connected groups that are currently active on the Virtual Private Network (VPN) device.

interface interface- name

(Optional) Displays the usage for the interface that is currently active on the Virtual Private Network (VPN) device. The interface name argument contains the following interfaces:

  • service-gre—Specifies GRE Service interfaces.

ivrf ivrf-name

(Optional) Displays status information about the inside VRF (IVRF) session. The ivrf-name argument is the name of the inside VRF.

local IP address

(Optional) Displays status information about crypto sessions of a local crypto endpoint. The IP address argument is the IP address of the local crypto endpoint.

profile profile name

(Optional) Displays Internet Security Association and Key Management Protocol (ISAKMP) profiles that are defined on a router. The profile name argument is the name of the ISAKMP profile.

remote IP address

(Optional) Displays status information about crypto sessions of a remote session.The IP address argument is the IP address of the remote crypto endpoint.

port remote-port

(Optional) Displays status information about crypto sessions of a remote crypto endpoint. The remote-port argument is from1 to 65535. The default value is 500.

user username

(Optional) Displays the usage for the connected user. The user name argument is the name of the user.

users

(Optional) Displays the usage for all the connected users.

Command Default

If the show crypto session command is entered without any keywords, all existing sessions are displayed. Port default values are 500. The default interface is tunnel-ipsec.

Command History

Release

Modification

Release 3.5.0

This command was introduced.

Usage Guidelines

To use this command, you must be in a user group associated with a task group that includes the proper task IDs. If you suspect user group assignment is preventing you from using a command, contact your AAA administrator.

You can get a list of all the active ISAKMP sessions and of the IKE and IPSec SAs for each session by using the show crypto session command. The following list is included:

  • Interface
  • IKE SAs that are associated with the peer by whom the IPSec SAs are created
  • IPSec SAs serving the flows of a session

Multiple IKE or IPSec SAs are established for the same peer (for the same session), in which case, IKE peer descriptions are repeated with different values for the IKE SAs that are associated with the peer and for the IPSec SAs that are serving the flows of the session.

Task ID

Task ID

Operations

crypto

read

Examples

The following example shows the list of fields from the show crypto session command:

RP/0/RP0/CPU0:router# show crypto session

Interface:      service-ipsec1
Profile:        prof1
ISAKMP policy:  10
Fvrf:           default
Ivrf:           default
Peer:           21.21.21.21/500
Ike SAs:        1
  IKE SA : conn-id 1 local 100.100.100.1/500 remote 21.21.21.21/500  QM_IDLE
 
Interface:      service-ipsec4
Username:       cisco
InterfaceProfile:        tunnel-ipsec3001ezvpnIke
ProfileGroup:          TUNNEL_IPSECgroup-a
Assigned address:  10.0.0.1
ISAKMP policy:  1020
Fvrf:           default
Ivrf:           default
Peer:           10192.1168.110.52/500
Ike SAs:        1
IPsec FlowsSAs:      1
  IKE SA : conn-id 1 2 local 10135.135.1135.1.6/500 remote 10192.1168.110.52/500  QM_IDLE
  IPSEC FLOW 1510: permit ipv4 100.70.2080.20/2550.2550.2550.255 0 10.70.2080.21/255.255.255.255
        Active SAs 2

The following example shows the detailed information of the session:

Interface:      tunnelservice-ipsec3001gre1
Profile:        TUNNEL_IPSECisakmp-prof1
ISAKMP policy:  10
Fvrf:           default
Ivrf:           default
Peer:           1040.140.140.62/500
Ike SAs:        1
IPsec FlowsSAs:      1
  IKE SA : conn-id 2 1 local 1050.150.150.52/500 remote 1040.140.140.62/500  QM_IDLE
  IPSEC FLOW 2501: permit ipv4 10gre 50.750.20850.2/255.255.255.255 1040.740.20840.2/255.255.255.255
        Active SAs 2
        Inbound:  #pkts dec'ed 5 0 drop 0 life (KB/Sec) 10000000099354592/32492414
        Outbound: #pkts encdec'ed 5 655653 drop 0 life (KB/Sec) 10000000099354592/32492414

Interface:      service-ipsec100
Profile:        isakmp-prof1
ISAKMP policy:  10
Fvrf:           default
Ivrf:           default
Peer:           60.60.60.2/500
Ike SAs:        1
IPsec SAs:      1
  IKE SA : conn-id 3 local 70.70.70.2/500 remote 60.60.60.2/500  QM_IDLE
  IPSEC FLOW 503: permit ipv4 13.13.13.1/255.255.255.255 14.14.14.1/255.255.255.255
        Active SAs 2
        Inbound:  #pkts dec'ed 0 drop 0 life (KB/Sec) 87560496/3204
        Outbound: #pkts dec'ed 12738053 drop 0 life (KB/Sec) 87560496/3204

This table describes the significant fields shown in the display.

Table 11 show crypto session Field Descriptions

Field

Description

Interface

Interface to which the crypto session is related.

IKE SA

Information is provided about the IKE SA, such as local and remote address and port, SA status, SA capabilities, crypto engine connection ID, and remaining lifetime of the IKE SA.

IPSEC FLOW

A snapshot of information about the IPSec-protected traffic flow, such as what the flow is; how many IPSec SAs there are; the origin of the SA; the number of encrypted or decrypted packets or dropped packets; and the IPSec SA remaining lifetime in kilobytes per second.

Related Commands

This topic has been deleted. Only users with topic management privileges can see it.

  • Доброго времени суток.
    Настроена связка L2TP+IPsec, для удаленного доступа.
    Пользователи L2TP используют Pre-Shared Key заданный для пользователей самого Pfsense созданых
    через User Manager.

    После перезагрузки PFsense начал работать только один из 2-х IPsec Pre-Shared Key, второй, судя
    по логам IPsec, не признается валидным. После повторной перезагрузки, ключи поменялись местами!
    Второй заработал, а первый не дает установить IPsec туннель.

    Кто-то может помочь разобраться с этой аномалией?

  • @JonnyDy
    Здр
    PFSense сам создает конфиги для IPSEC соединения . Чтобы посмотреть что у Вас получается в результате работы PF , откройте файл
    /var/etc/ipsec/ipsec.secrets

    так Вы сможете узнать , какие PSK должны быть использованы Strongswan-ом .

  • Они в зашифровоном виде? С Pre-Shared Key не совпадают. Но по ним подключится тоже не могу.

  • @JonnyDy
    Нет
    они должны полностью совпадать с теми PSK , которые Вам сгенерировал PF при настройке IPSEC

    p.s. Сорри — отличаются ( похоже, что PF использует кодировку Base64 от реального PSK)

  • @Konstanti На хэш-сумму не похоже.

  • @JonnyDy
    Base64 , скорее всего

  • @Konstanti said in Загадочное поведение Ipsec Pre-Shared Key.:

    Base64

    Подходит, только в начале стоит 0s Тогда пароли совпадают.

  • @JonnyDy

    Alternatively, preshared secrets can be represented as hexadecimal or Base64 encoded binary values. A character sequence beginning with 0x is interpreted as sequence hexadecimal digits. Similarly, a character sequence beginning with 0s is interpreted as Base64 encoded binary data.

    Тогда надо логи смотреть , что не нравится Strongswan-у

  • @Konstanti /var/log/ipsec.log

    Jan 22 18:08:16 pf charon: 14[ENC] <90> received unknown vendor ID: 01:52:8b:bb:9a:1c:5b:2a:51:00:00:00:01
    Jan 22 18:08:16 pf charon: 14[IKE] <90> received MS NT5 ISAKMPOAKLEY vendor ID
    Jan 22 18:08:16 pf charon: 14[IKE] <90> received NAT-T (RFC 3947) vendor ID
    Jan 22 18:08:16 pf charon: 14[IKE] <90> received draft-ietf-ipsec-nat-t-ike-02n vendor ID
    Jan 22 18:08:16 pf charon: 14[IKE] <90> received FRAGMENTATION vendor ID
    Jan 22 18:08:16 pf charon: 14[ENC] <90> received unknown vendor ID: fb:1d:e3💿e5:be:08:55:f1:20
    Jan 22 18:08:16 pf charon: 14[ENC] <90> received unknown vendor ID: 26:24:4d:38:2a:36:e3:d0:cf:b8:19
    Jan 22 18:08:16 pf charon: 14[ENC] <90> received unknown vendor ID: e3:a5:96:6a:82:31:e5:ce:86:52
    Jan 22 18:08:16 pf charon: 14[IKE] <90> KLIENT is initiating a Main Mode IKE_SA
    Jan 22 18:08:16 pf charon: 14[IKE] <90> IKE_SA (unnamed)[90] state change: CREATED => CONNECTING
    Jan 22 18:08:16 pf charon: 14[CFG] <90> selecting proposal:
    Jan 22 18:08:16 pf charon: 14[CFG] <90> no acceptable ENCRYPTION_ALGORITHM found
    Jan 22 18:08:16 pf charon: 14[CFG] <90> selecting proposal:
    Jan 22 18:08:16 pf charon: 14[CFG] <90> no acceptable ENCRYPTION_ALGORITHM found
    Jan 22 18:08:16 pf charon: 14[CFG] <90> selecting proposal:
    Jan 22 18:08:16 pf charon: 14[CFG] <90> no acceptable ENCRYPTION_ALGORITHM found
    Jan 22 18:08:16 pf charon: 14[CFG] <90> selecting proposal:
    Jan 22 18:08:16 pf charon: 14[CFG] <90> no acceptable DIFFIE_HELLMAN_GROUP found
    Jan 22 18:08:16 pf charon: 14[CFG] <90> selecting proposal:
    Jan 22 18:08:16 pf charon: 14[CFG] <90> proposal matches
    Jan 22 18:08:16 pf charon: 14[CFG] <90> received proposals: IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_384, IKE:AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_256, IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
    Jan 22 18:08:16 pf charon: 14[CFG] <90> configured proposals: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
    Jan 22 18:08:16 pf charon: 14[CFG] <90> selected proposal: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
    Jan 22 18:08:16 pf charon: 14[IKE] <90> sending XAuth vendor ID
    Jan 22 18:08:16 pf charon: 14[IKE] <90> sending DPD vendor ID
    Jan 22 18:08:16 pf charon: 14[IKE] <90> sending FRAGMENTATION vendor ID
    Jan 22 18:08:16 pf charon: 14[IKE] <90> sending NAT-T (RFC 3947) vendor ID
    Jan 22 18:08:16 pf charon: 14[ENC] <90> generating ID_PROT response 0 [ SA V V V V ]
    Jan 22 18:08:16 pf charon: 14[NET] <90> sending packet: from Server[500] to KLIENT[500] (156 bytes)
    Jan 22 18:08:16 pf charon: 14[NET] <90> received packet: from KLIENT500] to Server[500] (260 bytes)
    Jan 22 18:08:16 pf charon: 14[ENC] <90> parsed ID_PROT request 0 [ KE No NAT-D NAT-D ]
    Jan 22 18:08:16 pf charon: 14[IKE] <90> remote host is behind NAT
    Jan 22 18:08:16 pf charon: 14[CFG] <90> candidate «bypasslan», match: 1/1/24 (me/other/ike)
    Jan 22 18:08:16 pf charon: 14[CFG] <90> candidate «con-mobile», match: 1/1/28 (me/other/ike)
    Jan 22 18:08:16 pf charon: 14[ENC] <90> generating ID_PROT response 0 [ KE No NAT-D NAT-D ]
    Jan 22 18:08:16 pf charon: 14[NET] <90> sending packet: from Server[500] to KLIENT[500] (244 bytes)
    Jan 22 18:08:16 pf charon: 14[NET] <90> received packet: from KLIENT[4500] to Server[4500] (68 bytes)
    Jan 22 18:08:16 pf charon: 14[ENC] <90> invalid ID_V1 payload length, decryption failed?
    Jan 22 18:08:16 pf charon: 14[ENC] <90> could not decrypt payloads
    Jan 22 18:08:16 pf charon: 14[IKE] <90> message parsing failed
    Jan 22 18:08:16 pf charon: 14[ENC] <90> generating INFORMATIONAL_V1 request 1325909676 [ HASH N(PLD_MAL) ]
    Jan 22 18:08:16 pf charon: 14[NET] <90> sending packet: from Server[500] to KLIENT[500] (68 bytes)
    Jan 22 18:08:16 pf charon: 14[IKE] <90> ID_PROT request with message ID 0 processing failed
    Jan 22 18:08:17 pf charon: 14[NET] <90> received packet: from 1 KLIENT[4500] to Server[4500] (68 bytes)
    Jan 22 18:08:17 pf charon: 14[ENC] <90> invalid ID_V1 payload length, decryption failed?
    Jan 22 18:08:17 pf charon: 14[ENC] <90> could not decrypt payloads
    Jan 22 18:08:17 pf charon: 14[IKE] <90> message parsing failed
    Jan 22 18:08:17 pf charon: 14[ENC] <90> generating INFORMATIONAL_V1 request 4289034320 [ HASH N(PLD_MAL) ]
    Jan 22 18:08:17 pf charon: 14[NET] <90> sending packet: from Server[500] to KLIENT[500] (68 bytes)
    Jan 22 18:08:17 pf charon: 14[IKE] <90> ID_PROT request with message ID 0 processing failed
    Jan 22 18:08:18 pf charon: 16[NET] <90> received packet: from KLIENT[4500] to Server[4500] (68 bytes)
    Jan 22 18:08:18 pf charon: 16[ENC] <90> invalid ID_V1 payload length, decryption failed?
    Jan 22 18:08:18 pf charon: 16[ENC] <90> could not decrypt payloads
    Jan 22 18:08:18 pf charon: 16[IKE] <90> message parsing failed
    Jan 22 18:08:18 pf charon: 16[ENC] <90> generating INFORMATIONAL_V1 request 3361913591 [ HASH N(PLD_MAL) ]
    Jan 22 18:08:18 pf charon: 16[NET] <90> sending packet: from Server[500] to KLIENT[500] (68 bytes)
    Jan 22 18:08:18 pf charon: 16[IKE] <90> ID_PROT request with message ID 0 processing failed
    Jan 22 18:08:19 pf charon: 16[CFG] vici client 2381 connected
    Jan 22 18:08:19 pf charon: 10[CFG] vici client 2381 registered for: list-sa
    Jan 22 18:08:19 pf charon: 16[CFG] vici client 2381 requests: list-sas
    Jan 22 18:08:19 pf charon: 16[CFG] vici client 2381 disconnected
    Jan 22 18:08:21 pf charon: 16[NET] <90> received packet: from KLIENT[4500] to Server[4500] (68 bytes)
    Jan 22 18:08:21 pf charon: 16[ENC] <90> invalid ID_V1 payload length, decryption failed?
    Jan 22 18:08:21 pf charon: 16[ENC] <90> could not decrypt payloads
    Jan 22 18:08:21 pf charon: 16[IKE] <90> message parsing failed
    Jan 22 18:08:21 pf charon: 16[ENC] <90> generating INFORMATIONAL_V1 request 4089164931 [ HASH N(PLD_MAL) ]
    Jan 22 18:08:21 pf charon: 16[NET] <90> sending packet: from Server[500] to KLIENT[500] (68 bytes)
    Jan 22 18:08:21 pf charon: 16[IKE] <90> ID_PROT request with message ID 0 processing failed
    Jan 22 18:08:24 pf charon: 16[NET] <90> received packet: from KLIENT[4500] to Server[4500] (68 bytes)
    Jan 22 18:08:24 pf charon: 16[ENC] <90> invalid ID_V1 payload length, decryption failed?
    Jan 22 18:08:24 pf charon: 16[ENC] <90> could not decrypt payloads
    Jan 22 18:08:24 pf charon: 16[IKE] <90> message parsing failed
    Jan 22 18:08:24 pf charon: 16[ENC] <90> generating INFORMATIONAL_V1 request 4075989469 [ HASH N(PLD_MAL) ]
    Jan 22 18:08:24 pf charon: 16[NET] <90> sending packet: from Server[500] to KLIENT[500] (68 bytes)
    Jan 22 18:08:24 pf charon: 16[IKE] <90> ID_PROT request with message ID 0 processing failed
    Jan 22 18:08:27 pf charon: 16[NET] <90> received packet: from KLIENT[4500] to Server[4500] (68 bytes)
    Jan 22 18:08:27 pf charon: 16[ENC] <90> invalid ID_V1 payload length, decryption failed?
    Jan 22 18:08:27 pf charon: 16[ENC] <90> could not decrypt payloads
    Jan 22 18:08:27 pf charon: 16[IKE] <90> message parsing failed
    Jan 22 18:08:27 pf charon: 16[ENC] <90> generating INFORMATIONAL_V1 request 1570864920 [ HASH N(PLD_MAL) ]
    Jan 22 18:08:27 pf charon: 16[NET] <90> sending packet: from Server[500] to KLIENT[500] (68 bytes)
    Jan 22 18:08:27 pf charon: 16[IKE] <90> ID_PROT request with message ID 0 processing failed
    Jan 22 18:08:30 pf charon: 16[NET] <90> received packet: from KLIENT[4500] to Server[4500] (68 bytes)
    Jan 22 18:08:30 pf charon: 16[ENC] <90> invalid ID_V1 payload length, decryption failed?
    Jan 22 18:08:30 pf charon: 16[ENC] <90> could not decrypt payloads
    Jan 22 18:08:30 pf charon: 16[IKE] <90> message parsing failed
    Jan 22 18:08:30 pf charon: 16[ENC] <90> generating INFORMATIONAL_V1 request 4140701050 [ HASH N(PLD_MAL) ]
    Jan 22 18:08:30 pf charon: 16[NET] <90> sending packet: from Server[500] to KLIENT[500] (68 bytes)
    Jan 22 18:08:30 pf charon: 16[IKE] <90> ID_PROT request with message ID 0 processing failed
    Jan 22 18:08:33 pf charon: 05[CFG] vici client 2382 connected
    Jan 22 18:08:33 pf charon: 12[CFG] vici client 2382 registered for: list-sa
    Jan 22 18:08:33 pf charon: 12[CFG] vici client 2382 requests: list-sas
    Jan 22 18:08:33 pf charon: 12[CFG] vici client 2382 disconnected
    Jan 22 18:08:33 pf charon: 13[NET] <90> received packet: from KLIENT[4500] to Server[4500] (68 bytes)
    Jan 22 18:08:33 pf charon: 13[ENC] <90> invalid ID_V1 payload length, decryption failed?
    Jan 22 18:08:33 pf charon: 13[ENC] <90> could not decrypt payloads
    Jan 22 18:08:33 pf charon: 13[IKE] <90> message parsing failed
    Jan 22 18:08:33 pf charon: 13[ENC] <90> generating INFORMATIONAL_V1 request 1943284029 [ HASH N(PLD_MAL) ]
    Jan 22 18:08:33 pf charon: 13[NET] <90> sending packet: from Server[500] to KLIENT[500] (68 bytes)
    Jan 22 18:08:33 pf charon: 13[IKE] <90> ID_PROT request with message ID 0 processing failed
    Jan 22 18:08:46 pf charon: 13[JOB] <90> deleting half open IKE_SA with KLIENT after timeout
    Jan 22 18:08:46 pf charon: 13[IKE] <90> IKE_SA (unnamed)[90] state change: CONNECTING => DESTROYING
    Jan 22 18:08:48 pf charon: 13[CFG] vici client 2383 connected
    Jan 22 18:08:48 pf charon: 15[CFG] vici client 2383 registered for: list-sa
    Jan 22 18:08:48 pf charon: 05[CFG] vici client 2383 requests: list-sas
    Jan 22 18:08:48 pf charon: 05[CFG] vici client 2383 disconnected
    Jan 22 18:09:02 pf charon: 06[CFG] vici client 2384 connected
    Jan 22 18:09:02 pf charon: 11[CFG] vici client 2384 registered for: list-sa
    Jan 22 18:09:02 pf charon: 06[CFG] vici client 2384 requests: list-sas
    Jan 22 18:09:02 pf charon: 01[CFG] vici client 2384 disconnected
    Jan 22 18:09:17 pf charon: 01[CFG] vici client 2385 connected
    Jan 22 18:09:17 pf charon: 15[CFG] vici client 2385 registered for: list-sa
    Jan 22 18:09:17 pf charon: 15[CFG] vici client 2385 requests: list-sas
    Jan 22 18:09:17 pf charon: 15[CFG] vici client 2385 disconnected
    Jan 22 18:09:33 pf charon: 09[CFG] vici client 2386 connected
    Jan 22 18:09:33 pf charon: 09[CFG] vici client 2386 registered for: list-sa
    Jan 22 18:09:33 pf charon: 08[CFG] vici client 2386 requests: list-sas
    Jan 22 18:09:33 pf charon: 08[CFG] vici client 2386 disconnected
    Jan 22 18:09:47 pf charon: 01[CFG] vici client 2387 connected
    Jan 22 18:09:47 pf charon: 14[CFG] vici client 2387 registered for: list-sa
    Jan 22 18:09:47 pf charon: 14[CFG] vici client 2387 requests: list-sas
    Jan 22 18:09:47 pf charon: 14[CFG] vici client 2387 disconnected
    Jan 22 18:10:01 pf charon: 01[CFG] vici client 2388 connected
    Jan 22 18:10:01 pf charon: 16[CFG] vici client 2388 registered for: list-sa
    Jan 22 18:10:01 pf charon: 16[CFG] vici client 2388 requests: list-sas
    Jan 22 18:10:01 pf charon: 16[CFG] vici client 2388 disconnected
    Jan 22 18:10:15 pf charon: 10[CFG] vici client 2389 connected
    Jan 22 18:10:15 pf charon: 12[CFG] vici client 2389 registered for: list-sa
    Jan 22 18:10:15 pf charon: 12[CFG] vici client 2389 requests: list-sas
    Jan 22 18:10:15 pf charon: 12[CFG] vici client 2389 disconnected
    d not decrypt payloads

  • @JonnyDy
    Попробуйте , ради интереса , упростить PSK
    Например , убрать специальные символы , оставив только буквы и цифры

  • @Konstanti Делал 123456789. Не помогло. И что они по очереди работают необъяснимо.

  • Добрый.
    @JonnyDy
    Если тут https://redmine.pfsense.org/projects/pfsense/roadmap по слову «ipsec» вашей проблемы нет, то:

    1. Это новый баг.
    2. Это неверные настройки.

    Версия пф?

  • @JonnyDy
    Такое впечатление , что загружается только один из 2-х PSK.
    Вам надо посмотреть логи при старте IPSEC , не ругается ли Strongswan на что-нибудь

    Я бы тут рекомендовал вручную перезапустить Strongswan и глянуть логи инициализации.
    Такое ощущение , что он по какой-то причине только 1 PSK из 2-х использует.

  • @Konstanti Лог с низу в верх — перезапуск службы, удачное подключение с 1м ключем, неудачное со 2м.

    Jan 23 18:58:04 charon 10[IKE] <97> ID_PROT request with message ID 0 processing failed
    Jan 23 18:58:04 charon 10[NET] <97> sending packet: from Server[500] to Client[26012] (68 bytes)
    Jan 23 18:58:04 charon 10[ENC] <97> generating INFORMATIONAL_V1 request 2924403268 [ HASH N(PLD_MAL) ]
    Jan 23 18:58:04 charon 10[IKE] <97> message parsing failed
    Jan 23 18:58:04 charon 10[ENC] <97> could not decrypt payloads
    Jan 23 18:58:04 charon 10[ENC] <97> invalid ID_V1 payload length, decryption failed?
    Jan 23 18:58:04 charon 10[NET] <97> received packet: from Client[26014] to Server[4500] (68 bytes)
    Jan 23 18:58:01 charon 10[IKE] <97> ID_PROT request with message ID 0 processing failed
    Jan 23 18:58:01 charon 10[NET] <97> sending packet: from Server[500] to Client[26012] (68 bytes)
    Jan 23 18:58:01 charon 10[ENC] <97> generating INFORMATIONAL_V1 request 2724655533 [ HASH N(PLD_MAL) ]
    Jan 23 18:58:01 charon 10[IKE] <97> message parsing failed
    Jan 23 18:58:01 charon 10[ENC] <97> could not decrypt payloads
    Jan 23 18:58:01 charon 10[ENC] <97> invalid ID_V1 payload length, decryption failed?
    Jan 23 18:58:01 charon 10[NET] <97> received packet: from Client[26014] to Server[4500] (68 bytes)
    Jan 23 18:57:58 charon 10[IKE] <97> ID_PROT request with message ID 0 processing failed
    Jan 23 18:57:58 charon 10[NET] <97> sending packet: from Server[500] to Client[26012] (68 bytes)
    Jan 23 18:57:58 charon 10[ENC] <97> generating INFORMATIONAL_V1 request 3647127006 [ HASH N(PLD_MAL) ]
    Jan 23 18:57:58 charon 10[IKE] <97> message parsing failed
    Jan 23 18:57:58 charon 10[ENC] <97> could not decrypt payloads
    Jan 23 18:57:58 charon 10[ENC] <97> invalid ID_V1 payload length, decryption failed?
    Jan 23 18:57:58 charon 10[NET] <97> received packet: from Client[26014] to Server[4500] (68 bytes)
    Jan 23 18:57:57 charon 10[IKE] <97> ID_PROT request with message ID 0 processing failed
    Jan 23 18:57:57 charon 10[NET] <97> sending packet: from Server[500] to Client[26012] (68 bytes)
    Jan 23 18:57:57 charon 10[ENC] <97> generating INFORMATIONAL_V1 request 2049160632 [ HASH N(PLD_MAL) ]
    Jan 23 18:57:57 charon 10[IKE] <97> message parsing failed
    Jan 23 18:57:57 charon 10[ENC] <97> could not decrypt payloads
    Jan 23 18:57:57 charon 10[ENC] <97> invalid ID_V1 payload length, decryption failed?
    Jan 23 18:57:57 charon 10[NET] <97> received packet: from Client[26014] to Server[4500] (68 bytes)
    Jan 23 18:57:56 charon 10[IKE] <97> ID_PROT request with message ID 0 processing failed
    Jan 23 18:57:56 charon 10[NET] <97> sending packet: from Server[500] to Client[26012] (68 bytes)
    Jan 23 18:57:56 charon 10[ENC] <97> generating INFORMATIONAL_V1 request 2904458322 [ HASH N(PLD_MAL) ]
    Jan 23 18:57:56 charon 10[IKE] <97> message parsing failed
    Jan 23 18:57:56 charon 10[ENC] <97> could not decrypt payloads
    Jan 23 18:57:56 charon 10[ENC] <97> invalid ID_V1 payload length, decryption failed?
    Jan 23 18:57:56 charon 10[NET] <97> received packet: from Client[26014] to Server[4500] (68 bytes)
    Jan 23 18:57:56 charon 10[NET] <97> sending packet: from Server[500] to Client[26012] (244 bytes)
    Jan 23 18:57:56 charon 10[ENC] <97> generating ID_PROT response 0 [ KE No NAT-D NAT-D ]
    Jan 23 18:57:56 charon 10[CFG] <97> candidate «con-mobile», match: 1/1/28 (me/other/ike)
    Jan 23 18:57:56 charon 10[CFG] <97> candidate «bypasslan», match: 1/1/24 (me/other/ike)
    Jan 23 18:57:56 charon 10[IKE] <97> remote host is behind NAT
    Jan 23 18:57:56 charon 10[ENC] <97> parsed ID_PROT request 0 [ KE No NAT-D NAT-D ]
    Jan 23 18:57:56 charon 10[NET] <97> received packet: from Client[26012] to Server[500] (260 bytes)
    Jan 23 18:57:55 charon 10[NET] <97> sending packet: from Server[500] to Client[26012] (156 bytes)
    Jan 23 18:57:55 charon 10[ENC] <97> generating ID_PROT response 0 [ SA V V V V ]
    Jan 23 18:57:55 charon 10[IKE] <97> sending NAT-T (RFC 3947) vendor ID
    Jan 23 18:57:55 charon 10[IKE] <97> sending FRAGMENTATION vendor ID
    Jan 23 18:57:55 charon 10[IKE] <97> sending DPD vendor ID
    Jan 23 18:57:55 charon 10[IKE] <97> sending XAuth vendor ID
    Jan 23 18:57:55 charon 10[CFG] <97> selected proposal: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
    Jan 23 18:57:55 charon 10[CFG] <97> configured proposals: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
    Jan 23 18:57:55 charon 10[CFG] <97> received proposals: IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_384, IKE:AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_256, IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
    Jan 23 18:57:55 charon 10[CFG] <97> proposal matches
    Jan 23 18:57:55 charon 10[CFG] <97> selecting proposal:
    Jan 23 18:57:55 charon 10[CFG] <97> no acceptable DIFFIE_HELLMAN_GROUP found
    Jan 23 18:57:55 charon 10[CFG] <97> selecting proposal:
    Jan 23 18:57:55 charon 10[CFG] <97> no acceptable ENCRYPTION_ALGORITHM found
    Jan 23 18:57:55 charon 10[CFG] <97> selecting proposal:
    Jan 23 18:57:55 charon 10[CFG] <97> no acceptable ENCRYPTION_ALGORITHM found
    Jan 23 18:57:55 charon 10[CFG] <97> selecting proposal:
    Jan 23 18:57:55 charon 10[CFG] <97> no acceptable ENCRYPTION_ALGORITHM found
    Jan 23 18:57:55 charon 10[CFG] <97> selecting proposal:
    Jan 23 18:57:55 charon 10[IKE] <97> IKE_SA (unnamed)[97] state change: CREATED => CONNECTING
    Jan 23 18:57:55 charon 10[IKE] <97> Client is initiating a Main Mode IKE_SA
    Jan 23 18:57:55 charon 10[ENC] <97> received unknown vendor ID: e3:a5:96:6a:76:1:e5:ce:86:52
    Jan 23 18:57:55 charon 10[ENC] <97> received unknown vendor ID: 26:24:4d:38:ed:d:e3:d0:cf:b8:19
    Jan 23 18:57:55 charon 10[ENC] <97> received unknown vendor ID: fb:1d:e3💿f3:4e5:be:08:55:f1:20
    Jan 23 18:57:55 charon 10[IKE] <97> received FRAGMENTATION vendor ID
    Jan 23 18:57:55 charon 10[IKE] <97> received draft-ietf-ipsec-nat-t-ike-02n vendor ID
    Jan 23 18:57:55 charon 10[IKE] <97> received NAT-T (RFC 3947) vendor ID
    Jan 23 18:57:55 charon 10[IKE] <97> received MS NT5 ISAKMPOAKLEY vendor ID
    Jan 23 18:57:55 charon 10[ENC] <97> received unknown vendor ID: 01:52:8b:bb:c0:06:96:12:18:49:ab:9a:1c:5b:2a:51:00:00:00:01
    Jan 23 18:57:55 charon 10[CFG] <97> found matching ike config: %any…%any with prio 28
    Jan 23 18:57:55 charon 10[CFG] <97> candidate: %any…%any, prio 28
    Jan 23 18:57:55 charon 10[CFG] <97> candidate: %any…%any, prio 24
    Jan 23 18:57:55 charon 10[CFG] <97> looking for an IKEv1 config for Server…Client
    Jan 23 18:57:55 charon 10[ENC] <97> parsed ID_PROT request 0 [ SA V V V V V V V V ]
    Jan 23 18:57:55 charon 10[NET] <97> received packet: from Client[26012] to Server[500] (408 bytes)
    Jan 23 18:56:57 charon 08[IKE] <con-mobile|96> IKE_SA con-mobile[96] state change: DELETING => DESTROYING
    Jan 23 18:56:57 charon 08[IKE] <con-mobile|96> IKE_SA con-mobile[96] state change: DELETING => DELETING
    Jan 23 18:56:57 charon 08[IKE] <con-mobile|96> IKE_SA con-mobile[96] state change: ESTABLISHED => DELETING
    Jan 23 18:56:57 charon 08[IKE] <con-mobile|96> deleting IKE_SA con-mobile[96] between Server[Server]…Client[10.0.1.2]
    Jan 23 18:56:57 charon 08[IKE] <con-mobile|96> received DELETE for IKE_SA con-mobile[96]
    Jan 23 18:56:57 charon 08[ENC] <con-mobile|96> parsed INFORMATIONAL_V1 request 1852228707 [ HASH D ]
    Jan 23 18:56:57 charon 08[NET] <con-mobile|96> received packet: from Client[26014] to Server[4500] (84 bytes)
    Jan 23 18:56:57 charon 10[CHD] <con-mobile|96> CHILD_SA con-mobile{53} state change: DELETED => DESTROYING
    Jan 23 18:56:57 charon 10[CHD] <con-mobile|96> CHILD_SA con-mobile{53} state change: DELETING => DELETED
    Jan 23 18:56:57 charon 10[IKE] <con-mobile|96> closing CHILD_SA con-mobile{53} with SPIs c7c2ff98_i (15216 bytes) d7287faa_o (2416 bytes) and TS Server/32|/0[udp/l2f] === Client/32|/0[udp/l2f]
    Jan 23 18:56:57 charon 10[CHD] <con-mobile|96> CHILD_SA con-mobile{53} state change: INSTALLED => DELETING
    Jan 23 18:56:57 charon 10[IKE] <con-mobile|96> received DELETE for ESP CHILD_SA with SPI d7287faa
    Jan 23 18:56:57 charon 10[ENC] <con-mobile|96> parsed INFORMATIONAL_V1 request 38628092 [ HASH D ]
    Jan 23 18:56:57 charon 10[NET] <con-mobile|96> received packet: from Client[26014] to Server[4500] (76 bytes)
    Jan 23 18:56:53 charon 05[KNL] interface l2tp1 disappeared
    Jan 23 18:56:53 charon 05[KNL] interface l2tp1 deactivated
    Jan 23 18:56:53 charon 05[KNL] LANdisappeared from l2tp1
    Jan 23 18:56:53 charon 15[KNL] interface l2tp1 appeared
    Jan 23 18:56:48 charon 15[KNL] interface ng0 disappeared
    Jan 23 18:56:48 charon 15[KNL] fe80::250:56ff:fe00:a908 appeared on ng0
    Jan 23 18:56:48 charon 11[KNL] LANappeared on ng0
    Jan 23 18:56:48 charon 11[KNL] interface ng0 appeared
    Jan 23 18:56:48 charon 11[CHD] <con-mobile|96> CHILD_SA con-mobile{53} state change: INSTALLING => INSTALLED
    Jan 23 18:56:48 charon 11[IKE] <con-mobile|96> CHILD_SA con-mobile{53} established with SPIs c7c2ff98_i d7287faa_o and TS Server/32|/0[udp/l2f] === Client/32|/0[udp/l2f]
    Jan 23 18:56:48 charon 11[CHD] <con-mobile|96> SPI 0xd7287faa, src Server dst Client
    Jan 23 18:56:48 charon 11[CHD] <con-mobile|96> adding outbound ESP SA
    Jan 23 18:56:48 charon 11[CHD] <con-mobile|96> SPI 0xc7c2ff98, src Client dst Server
    Jan 23 18:56:48 charon 11[CHD] <con-mobile|96> adding inbound ESP SA
    Jan 23 18:56:48 charon 11[CHD] <con-mobile|96> using HMAC_SHA1_96 for integrity
    Jan 23 18:56:48 charon 11[CHD] <con-mobile|96> using AES_CBC for encryption
    Jan 23 18:56:48 charon 11[CHD] <con-mobile|96> CHILD_SA con-mobile{53} state change: CREATED => INSTALLING
    Jan 23 18:56:48 charon 11[ENC] <con-mobile|96> parsed QUICK_MODE request 1 [ HASH ]
    Jan 23 18:56:48 charon 11[NET] <con-mobile|96> received packet: from Client[26014] to Server[4500] (60 bytes)
    Jan 23 18:56:48 charon 11[NET] <con-mobile|96> sending packet: from Server[4500] to Client[26014] (204 bytes)
    Jan 23 18:56:48 charon 11[ENC] <con-mobile|96> generating QUICK_MODE response 1 [ HASH SA No ID ID NAT-OA NAT-OA ]
    Jan 23 18:56:48 charon 11[IKE] <con-mobile|96> received 250000000 lifebytes, configured 0
    Jan 23 18:56:48 charon 11[IKE] <con-mobile|96> received 3600s lifetime, configured 28800s
    Jan 23 18:56:48 charon 11[CFG] <con-mobile|96> selected proposal: ESP:AES_CBC_256/HMAC_SHA1_96/NO_EXT_SEQ
    Jan 23 18:56:48 charon 11[CFG] <con-mobile|96> configured proposals: ESP:AES_CBC_256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ
    Jan 23 18:56:48 charon 11[CFG] <con-mobile|96> received proposals: ESP:AES_CBC_256/HMAC_SHA1_96/NO_EXT_SEQ, ESP:AES_CBC_128/HMAC_SHA1_96/NO_EXT_SEQ, ESP:3DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:DES_CBC/HMAC_SHA1_96/NO_EXT_SEQ, ESP:NULL/HMAC_SHA1_96/NO_EXT_SEQ
    Jan 23 18:56:48 charon 11[CFG] <con-mobile|96> proposal matches
    Jan 23 18:56:48 charon 11[CFG] <con-mobile|96> selecting proposal:
    Jan 23 18:56:48 charon 11[CFG] <con-mobile|96> config: Server/32|/0, received: Server/32|/0[udp/l2f] => match: Server/32|/0[udp/l2f]
    Jan 23 18:56:48 charon 11[CFG] <con-mobile|96> selecting traffic selectors for us:
    Jan 23 18:56:48 charon 11[CFG] <con-mobile|96> config: Client/32|/0, received: Client/32|/0[udp/l2f] => match: Client/32|/0[udp/l2f]
    Jan 23 18:56:48 charon 11[CFG] <con-mobile|96> selecting traffic selectors for other:
    Jan 23 18:56:48 charon 11[CFG] <con-mobile|96> found matching child config «con-mobile» with prio 2
    Jan 23 18:56:48 charon 11[CFG] <con-mobile|96> candidate «con-mobile» with prio 1+1
    Jan 23 18:56:48 charon 11[CFG] <con-mobile|96> Client/32|/0
    Jan 23 18:56:48 charon 11[CFG] <con-mobile|96> proposing traffic selectors for other:
    Jan 23 18:56:48 charon 11[CFG] <con-mobile|96> Server/32|/0
    Jan 23 18:56:48 charon 11[CFG] <con-mobile|96> proposing traffic selectors for us:
    Jan 23 18:56:48 charon 11[CFG] <con-mobile|96> looking for a child config for Server/32|/0[udp/l2f] === Client/32|/0[udp/l2f]
    Jan 23 18:56:48 charon 11[IKE] <con-mobile|96> changing received traffic selectors 192.168.1.2/32|/0[udp/l2f]=== Server/32|/0[udp/l2f] due to NAT
    Jan 23 18:56:48 charon 11[ENC] <con-mobile|96> parsed QUICK_MODE request 1 [ HASH SA No ID ID NAT-OA NAT-OA ]
    Jan 23 18:56:48 charon 11[NET] <con-mobile|96> received packet: from Client[26014] to Server[4500] (436 bytes)
    Jan 23 18:56:48 charon 01[NET] <con-mobile|96> sending packet: from Server[4500] to Client[26014] (68 bytes)
    Jan 23 18:56:48 charon 01[ENC] <con-mobile|96> generating ID_PROT response 0 [ ID HASH ]
    Jan 23 18:56:48 charon 01[IKE] <con-mobile|96> DPD not supported by peer, disabled
    Jan 23 18:56:48 charon 01[IKE] <con-mobile|96> maximum IKE_SA lifetime 86034s
    Jan 23 18:56:48 charon 01[IKE] <con-mobile|96> scheduling reauthentication in 85494s
    Jan 23 18:56:48 charon 01[IKE] <con-mobile|96> IKE_SA con-mobile[96] state change: CONNECTING => ESTABLISHED
    Jan 23 18:56:48 charon 01[IKE] <con-mobile|96> IKE_SA con-mobile[96] established between Server[Server]…Client[10.0.1.2]
    Jan 23 18:56:48 charon 01[CFG] <96> selected peer config «con-mobile»
    Jan 23 18:56:48 charon 01[CFG] <96> candidate «con-mobile», match: 1/1/28 (me/other/ike)
    Jan 23 18:56:48 charon 01[CFG] <96> candidate «bypasslan», match: 1/1/24 (me/other/ike)
    Jan 23 18:56:48 charon 01[CFG] <96> looking for pre-shared key peer configs matching Server…Client[10.0.1.2]
    Jan 23 18:56:48 charon 01[ENC] <96> parsed ID_PROT request 0 [ ID HASH ]
    Jan 23 18:56:48 charon 01[NET] <96> received packet: from Client[26014] to Server[4500] (68 bytes)
    Jan 23 18:56:48 charon 01[NET] <96> sending packet: from Server[500] to Client[26012] (244 bytes)
    Jan 23 18:56:48 charon 01[ENC] <96> generating ID_PROT response 0 [ KE No NAT-D NAT-D ]
    Jan 23 18:56:48 charon 01[CFG] <96> candidate «con-mobile», match: 1/1/28 (me/other/ike)
    Jan 23 18:56:48 charon 01[CFG] <96> candidate «bypasslan», match: 1/1/24 (me/other/ike)
    Jan 23 18:56:48 charon 01[IKE] <96> remote host is behind NAT
    Jan 23 18:56:48 charon 01[ENC] <96> parsed ID_PROT request 0 [ KE No NAT-D NAT-D ]
    Jan 23 18:56:48 charon 01[NET] <96> received packet: from Client[26012] to Server[500] (260 bytes)
    Jan 23 18:56:48 charon 01[NET] <96> sending packet: from Server[500] to Client[26012] (156 bytes)
    Jan 23 18:56:48 charon 01[ENC] <96> generating ID_PROT response 0 [ SA V V V V ]
    Jan 23 18:56:48 charon 01[IKE] <96> sending NAT-T (RFC 3947) vendor ID
    Jan 23 18:56:48 charon 01[IKE] <96> sending FRAGMENTATION vendor ID
    Jan 23 18:56:48 charon 01[IKE] <96> sending DPD vendor ID
    Jan 23 18:56:48 charon 01[IKE] <96> sending XAuth vendor ID
    Jan 23 18:56:48 charon 01[CFG] <96> selected proposal: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
    Jan 23 18:56:48 charon 01[CFG] <96> configured proposals: IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024, IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
    Jan 23 18:56:48 charon 01[CFG] <96> received proposals: IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_384, IKE:AES_CBC_128/HMAC_SHA1_96/PRF_HMAC_SHA1/ECP_256, IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:3DES_CBC/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024
    Jan 23 18:56:48 charon 01[CFG] <96> proposal matches
    Jan 23 18:56:48 charon 01[CFG] <96> selecting proposal:
    Jan 23 18:56:48 charon 01[CFG] <96> no acceptable DIFFIE_HELLMAN_GROUP found
    Jan 23 18:56:48 charon 01[CFG] <96> selecting proposal:
    Jan 23 18:56:48 charon 01[CFG] <96> no acceptable ENCRYPTION_ALGORITHM found
    Jan 23 18:56:48 charon 01[CFG] <96> selecting proposal:
    Jan 23 18:56:48 charon 01[CFG] <96> no acceptable ENCRYPTION_ALGORITHM found
    Jan 23 18:56:48 charon 01[CFG] <96> selecting proposal:
    Jan 23 18:56:48 charon 01[CFG] <96> no acceptable ENCRYPTION_ALGORITHM found
    Jan 23 18:56:48 charon 01[CFG] <96> selecting proposal:
    Jan 23 18:56:48 charon 01[IKE] <96> IKE_SA (unnamed)[96] state change: CREATED => CONNECTING
    Jan 23 18:56:48 charon 01[IKE] <96> Client is initiating a Main Mode IKE_SA
    Jan 23 18:56:48 charon 01[ENC] <96> received unknown vendor ID: e3:a5:96:69f:e7:0:31:e5:ce:86:52
    Jan 23 18:56:48 charon 01[ENC] <96> received unknown vendor ID: 26:24:4d:38:61:b6:e3:d0:cf:b8:19
    Jan 23 18:56:48 charon 01[ENC] <96> received unknown vendor ID: fb:1d:e3:c:be:08:55:f1:20
    Jan 23 18:56:48 charon 01[IKE] <96> received FRAGMENTATION vendor ID
    Jan 23 18:56:48 charon 01[IKE] <96> received draft-ietf-ipsec-nat-t-ike-02n vendor ID
    Jan 23 18:56:48 charon 01[IKE] <96> received NAT-T (RFC 3947) vendor ID
    Jan 23 18:56:48 charon 01[IKE] <96> received MS NT5 ISAKMPOAKLEY vendor ID
    Jan 23 18:56:48 charon 01[ENC] <96> received unknown vendor ID: 01:52:8b:bb:c0:06:96:12:18:49:ab:9a:1c:5b:2a:51:00:00:00:01
    Jan 23 18:56:48 charon 01[CFG] <96> found matching ike config: %any…%any with prio 28
    Jan 23 18:56:48 charon 01[CFG] <96> candidate: %any…%any, prio 28
    Jan 23 18:56:48 charon 01[CFG] <96> candidate: %any…%any, prio 24
    Jan 23 18:56:48 charon 01[CFG] <96> looking for an IKEv1 config for Server…Client
    Jan 23 18:56:48 charon 01[ENC] <96> parsed ID_PROT request 0 [ SA V V V V V V V V ]
    Jan 23 18:56:48 charon 01[NET] <96> received packet: from Client[26012] to Server[500] (408 bytes)
    Jan 23 18:56:04 charon 13[CFG] added configuration ‘con-mobile’
    Jan 23 18:56:04 charon 13[CFG] keyexchange=ikev1
    Jan 23 18:56:04 charon 13[CFG] mediation=no
    Jan 23 18:56:04 charon 13[CFG] sha256_96=no
    Jan 23 18:56:04 charon 13[CFG] dpdaction=1
    Jan 23 18:56:04 charon 13[CFG] dpdtimeout=60
    Jan 23 18:56:04 charon 13[CFG] dpddelay=10
    Jan 23 18:56:04 charon 13[CFG] esp=aes256-sha1,3des-sha1!
    Jan 23 18:56:04 charon 13[CFG] ike=3des-sha1-modp1024,aes256-sha1-modp1024!
    Jan 23 18:56:04 charon 13[CFG] rightauth=psk
    Jan 23 18:56:04 charon 13[CFG] rightdns=
    Jan 23 18:56:04 charon 13[CFG] right=%any
    Jan 23 18:56:04 charon 13[CFG] leftid=Server
    Jan 23 18:56:04 charon 13[CFG] leftauth=psk
    Jan 23 18:56:04 charon 13[CFG] left=%any
    Jan 23 18:56:04 charon 13[CFG] conn con-mobile
    Jan 23 18:56:04 charon 13[CFG] received stroke: add connection ‘con-mobile’
    Jan 23 18:56:04 ipsec_starter 50390 ‘bypasslan’ shunt PASS policy installed
    Jan 23 18:56:04 charon 12[CFG] received stroke: route ‘bypasslan’
    Jan 23 18:56:04 charon 13[CFG] added configuration ‘bypasslan’
    Jan 23 18:56:04 charon 13[CFG] mediation=no
    Jan 23 18:56:04 charon 13[CFG] sha256_96=no
    Jan 23 18:56:04 charon 13[CFG] dpdtimeout=150
    Jan 23 18:56:04 charon 13[CFG] dpddelay=30
    Jan 23 18:56:04 charon 13[CFG] rightsubnet=LAN
    Jan 23 18:56:04 charon 13[CFG] right=%any
    Jan 23 18:56:04 charon 13[CFG] leftsubnet=LAN
    Jan 23 18:56:04 charon 13[CFG] left=%any
    Jan 23 18:56:04 charon 13[CFG] conn bypasslan
    Jan 23 18:56:04 charon 13[CFG] received stroke: add connection ‘bypasslan’
    Jan 23 18:56:04 charon 12[CFG] deleted connection ‘con-mobile’
    Jan 23 18:56:04 charon 12[CFG] received stroke: delete connection ‘con-mobile’
    Jan 23 18:56:04 charon 14[CFG] deleted connection ‘bypasslan’
    Jan 23 18:56:04 charon 14[CFG] received stroke: delete connection ‘bypasslan’
    Jan 23 18:56:04 ipsec_starter 50390 shunt policy ‘bypasslan’ uninstalled
    Jan 23 18:56:04 charon 13[CFG] received stroke: unroute ‘bypasslan’
    Jan 23 18:56:04 charon 14[CFG] rereading crls from ‘/usr/local/etc/ipsec.d/crls’
    Jan 23 18:56:04 charon 14[CFG] rereading attribute certificates from ‘/usr/local/etc/ipsec.d/acerts’
    Jan 23 18:56:04 charon 14[CFG] rereading ocsp signer certificates from ‘/usr/local/etc/ipsec.d/ocspcerts’
    Jan 23 18:56:04 charon 14[CFG] rereading aa certificates from ‘/usr/local/etc/ipsec.d/aacerts’
    Jan 23 18:56:04 charon 14[CFG] rereading ca certificates from ‘/usr/local/etc/ipsec.d/cacerts’
    Jan 23 18:56:04 charon 14[CFG] loaded IKE secret for Server user2
    Jan 23 18:56:04 charon 14[CFG] loaded IKE secret for Server user1
    Jan 23 18:56:04 charon 14[CFG] loading secrets from ‘/var/etc/ipsec/ipsec.secrets’
    Jan 23 18:56:04 charon 14[CFG] rereading secrets

  • @werter
    2.4.4-RELEASE-p3 (amd64)
    built on Wed May 15 18:53:44 EDT 2019
    FreeBSD 11.2-RELEASE-p10

    Обновлялся сразу после выхода релиза, но проблема с ключами возникла в этом году.

  • @JonnyDy
    Пересоздайте ipsec-подключения.

  • @JonnyDy
    Покажите пожалуйста содержимое файла
    /var/etc/ipsec/ipsec.conf

  • @Konstanti said in Загадочное поведение Ipsec Pre-Shared Key.:

    /var/etc/ipsec/ipsec.conf

    This file is automatically generated. Do not edit

    config setup
    uniqueids = yes

    conn bypasslan
    leftsubnet = LAN/24
    rightsubnet = LAN/24
    authby = never
    type = passthrough
    auto = route

    conn con-mobile
    fragmentation = yes
    keyexchange = ikev1
    reauth = yes
    forceencaps = no
    mobike = no

    rekey = yes
    installpolicy = yes
    type = transport
    dpdaction = clear
    dpddelay = 10s
    dpdtimeout = 60s
    auto = add
    left = %any
    right = %any
    leftid = WAN
    ikelifetime = 86400s
    lifetime = 28800s
    rightdns = DNS1,DNS2
    ike = 3des-sha1-modp1024,aes256-sha1-modp1024!
    esp = aes256-sha1,3des-sha1!
    leftauth = psk
    rightauth = psk
    aggressive = no
    
  • This post is deleted!

  • @werter Сделаю и в понедельник отпишу.

  • @JonnyDy
    Попробуйте сделать вот по этой инструкции

    https://docs.netgate.com/pfsense/en/latest/vpn/ipsec/l2tp-ipsec.html

  • @Konstanti Не помогло, работает после полного удаления и пересоздания только один ключ.

  • @werter пересоздал, тоже самое.

  • @JonnyDy
    По ссылке используется 1 общий PSK на всех
    А вот имя пользователя и пароль для всех разные

  • @Konstanti А, учетку allusers я не создавал, это смысла не имеет. Пробовал на тех же ключах для системных пользователей.

  • @Konstanti Спасибо, настроил общий ключ. До выхода новой версии на нем поработаю, потом попробую снова отдельные ключи для пользователей.

  • @JonnyDy
    Тогда лучше на сертификатах все делать

  • @konstanti Понимаю, что странно писать столько времени спустя. Но внезапно возник вопрос, ключи EAP с общим PSK не связаны? Можно общий и PSK и EAP по одному создать?

  • Понравилась статья? Поделить с друзьями:
  • Pre def на кондиционере как исправить
  • Pragma error oracle
  • Pragma error disable
  • Praetorians как изменить разрешение экрана
  • Prado 150 ошибка 4lo