Configuring Internet Key Exchange Version 2 (IKEv2)
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Contents
Configuring Internet Key Exchange Version 2Last Updated: May 19, 2011
This module describes the Internet Key Exchange Version 2 (IKEv2) protocol. IKEv2 is the supporting protocol for IP Security Protocol (IPsec) and is used for performing mutual authentication and establishing and maintaining security associations (SAs).
Finding Feature InformationYour software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the Feature Information Table at the end of this document. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required. Prerequisites for Configuring Internet Key Exchange Version 2You should be familiar with the concepts and tasks explained in the module Configuring Security for VPNs with IPsec . Restrictions for Configuring Internet Key Exchange Version 2
Information About Internet Key Exchange Version 2IKEv2, a next-generation key management protocol based on RFC 4306, is an enhancement of the IKE protocol. IKEv2 supports crypto map-and tunnel protection-based crypto interfaces. The crypto map-based applications include static and dynamic crypto maps, and the tunnel protection-based applications pertain to IPsec static VTI (sVTI), dynamic VTI (dVTI), point-point, and multipoint generic routing encapsulation (mGRE) tunnel interfaces. The VPN solutions include site-to-site VPN, DMVPN, and remote access VPN headend. The following sections describe the constructs of the IKEv2 protocol in Cisco IOS software:
IKEv2 ProposalAn IKEv2 proposal is a collection of transforms used in the negotiation of IKE SAs as part of the IKE_SA_INIT exchange. The transform types used in the negotiation are as follows:
You must configure at least one encryption algorithm, one integrity algorithm, and one DH group for the proposal to be considered incomplete. The PRF algorithm is the same as the integrity algorithm, and hence, it is not configured separately. Multiple transforms can be configured and proposed by the initiator for encryption, integrity, and group, of which one transform is selected by the responder. When multiple transforms are configured for a transform type, the order of priority is from left to right. IKEv2 proposals are named and not numbered during the configuration. Manually configured IKEv2 proposals must be linked with an IKEv2 policy; otherwise, the proposals are not used in the negotiation. Cisco IOS Suite-B Support for IKEv2 ProposalSuite-B adds support for the SHA-2 family (HMAC variant) hash algorithm used to authenticate packet data and verify the integrity verification mechanisms for the IKEv2 proposal configuration. HMAC is a variant that provides an additional level of hashing. Suite-B also allows the Elliptic Curve Digital Signature Algorithm (ECDSA) signature (ECDSA-sig), as defined in RFC 4754, to be the authentication method for IKEv2, which is configured in the IKEv2 profile. See Configuring the IKEv2 Profile for more information. Suite-B requirements comprise four user-interface suites of cryptographic algorithms for use with IKE and IPSec that are described in RFC 4869. Each suite consists of an encryption algorithm, a digital-signature algorithm, a key-agreement algorithm, and a hash- or message-digest algorithm. See the Configuring Security for VPNs with IPsec feature module for more detailed information about Cisco IOS Suite-B support. IKEv2 PolicyAn IKEv2 policy contains proposals that are used to negotiate the encryption, integrity, PRF algorithms, and DH group in SA_INIT exchange. It can have match statements which are used as selection criteria to select a policy during negotiation. IKEv2 ProfileAn IKEv2 profile is a repository of the nonnegotiable parameters of the IKE SA, such as local or remote identities and authentication methods and the services that are available to the authenticated peers that match the profile.An IKEv2 profile must be attached to either crypto map or IPSec profile on both IKEv2 initiator and responder. IKEv2 KeyringAn IKEv2 keyring is a repository of symmetric and asymmetric preshared keys and is independent of the IKEv1 keyring. The IKEv2 keyring is associated with an IKEv2 profile and hence, caters to a set of peers that match the IKEv2 profile. The IKEv2 keyring gets its VRF context from the associated IKEv2 profile. IKEv2 Remote Access ServerThe IKEv2 Remote Access (RA) server feature implements the IKEv2 RFC compliant remote access server and adds support for the following: The IKEv2 remote access server interoperates with the Microsoft Windows7 IKEv2 client.
Peer Authentication Using Extensible Authentication Protocol (EAP)The IKEv2 RA server supports peer authentication using EAP and acts as a pass-through authenticator relaying EAP messages between the RA client and the backend EAP server. The backend EAP server is typically a RADIUS server that supports EAP authentication.
The RA server is configured to authenticate RA clients using EAP by configuring the authentication remote eap command in IKEv2 profile configuration mode. The RA clients indicate the intent to authenticate using EAP by skipping AUTH payload in the IKE_AUTH request. If the query-identity argument is configured, the RA server queries the EAP identity from the RA client; otherwise, the RA clientâs IKEv2 identity is used as the EAP identity. However, if the query-identity argument is not configured and the RA clientâs IKEv2 identity is an IPv4 or IPv6 address, the session is terminated because IP addresses cannot be used as the EAP identity. The RA server starts the EAP authentication by passing the RA clientâs EAP identity to the EAP server and relays EAP messages between the RA client and the EAP server until the authentication is complete. If the authentication succeeds, the EAP server is expected to return the authenticated EAP identity to the RA server in the EAP success message. After EAP authentication, the EAP identity, which is used for the configured user or group authorizations, is obtained from the following sources in the given order:
The authorization data received from the EAP server along with the EAP success message is considered as the user authorization data. User authorization if configured is performed only if the EAP server does not provide authorization data along with the EAP success message or provides an invalid framed-ip-address per-user attribute. Attributes received from the EAP server are overridden and merged with the user authorization data. The figure below shows IKEv2 exchange for EAP authentication without the query-identity argument. The figure below shows IKEv2 exchange for EAP authentication with the query-identity argument. IKEv2 RA Server Support for IPv4 Configuration AttributesThe IKEv2 RA server supports the following IKEv2 configuration attributes:
The IKEv2 RA server fetches the attribute values from AAA through user and group authorizations. The INTERNAL_IP4_ADDRESS attribute value is derived from the following sources in the given order:
A lower priority address sources is used for address allocation only if the higher priority address source is not configured. However, if address allocation from the higher priority address source results in an error, the next source is not tried and the session is terminated. The value for INTERNAL_IP4_NETMASK attribute is derived as follows:
If the client requests multiple IPv4 addresses, only one IPv4 address is sent in the reply. An IPv4 address is allocated and included in the reply only if the client requests an address. If available, the remaining attributes are included in the reply even though the client does not request it. If the client requests an IPv4 address and the RA server is unable to assign an address, an INTERNAL_ADDRESS_FAILURE message is returned to the client. IKEv2 User And Group AuthorizationThe IKEv2 RA server supports user and group authorizations. You can configure user authorizations, group authorizations, both, or none. The username for the user and group authorizations can be directly specified or derived from the peer IKEv2 identity using a name mangler. Group authorization can be local and external-AAA based, while user authorization can only be external-AAA based. The IKEv2 authorization policy serves as a container of IKEv2 local AAA group authorization parameters. If AAA user and group authorizations are not configured, it is not considered an error. However, after configuring the user and group authorization, an error encountered during AAA authorization is treated as an error and the connection is terminated. User authorization attributes take a higher priority in constructing a reply when group and user authorization are configured. The framed-ip per-user attribute is always fetched from the user authorization data and ignored if received in the group authorization data. Other attributes are derived from both user and group authorization data with user authorization data taking the higher priority. IKEv2 Supported StandardsCisco implements the IP Security Protocol (IPsec) standard for use in IKEv2. The component technologies implemented in IKEv2 are as follows:
For more information on the supported standards and component technologies, see Supported Standards for Use with IKE . Benefits of IKEv2The benefits of IKEv2 are described in the following sections: Reliability and State Management (Windowing)IKEv2 uses sequence numbers and acknowledgments to provide reliability, and mandates some error-processing logistics and shared state management. How to Configure Internet Key Exchange Version 2To enable IKEv2 on a crypto interface, attach an IKEv2 profile to the crypto map or IPsec profile applied to the interface.
Perform the following tasks to manually configure IKEv2:
Configuring Global IKEv2 Options
Perform this task to configure global IKEv2 options that are independent of peers. DETAILED STEPS Configuring the IKEv2 Proposal
Perform this task to configure the proposals manually if you do not want to use the default proposal. The default IKEv2 proposal requires no configuration and is a collection of commonly used transforms types, which are as follows: encryption aes-cbc-128 3des integrity sha md5 group 5 2 The transform types shown below translate to the transform combinations in the following order of priority: aes-cbc-128, sha, 5 aes-cbc-128, sha, 2 aes-cbc-128, md5, 5 aes-cbc-128, md5, 2 3des, sha, 5 3des, sha, 2 3des, md5, 5 3des, md5, 2 DETAILED STEPS What to Do NextAfter you create the IKEv2 proposal, the proposal must be attached to a policy to pick the proposal for negotiation. For information on completing this task, see the Configuring the IKEv2 Policy section. Configuring the IKEv2 Policy
Perform this task to manually create an IKEv2 policy; otherwise, the default proposal associated with the default policy is used for negotiation. An IKEv2 policy with no proposal is considered incomplete. During the initial exchange, the local address (IPv4 or IPv6) and the FVRF of the negotiating SA is matched with the policy and the proposal is selected. DETAILED STEPS Troubleshooting Tips
What to Do NextDepending on the match parameters specified in your IKE policies, you must perform certain additional configuration tasks before IKE and IPsec can successfully use the IKE policies. For information on completing these additional tasks, see the Configuring the IKEv2 Keyring section. Configuring the IKEv2 KeyringPerform this task to configure the IKEv2 keyring if the local or remote authentication method is a preshared key. IKEv2 keyring keys must be configured in the peer configuration submode that defines a peer subblock. An IKEv2 keyring can have multiple peer subblocks. A peer subblock contains a single symmetric or asymmetric key pair for a peer or peer group identified by any combination of hostname, identity, and IP address. DETAILED STEPS
What to Do NextAfter configuring the IKEv2 keyring, configure the IKEv2 profile. For more information, see the Configuring the IKEv2 Profile section. Configuring the IKEv2 ProfileAn IKEv2 profile is a repository of nonnegotiable parameters of the IKE SA (such as local/remote identities and authentication methods) and the services available to the authenticated peers that match the profile. An IKEv2 profile must be configured and must be attached to either a crypto map or an IPSec profile on both the IKEv2 initiator and responder. Use the command set ikev2-profile profile-name to attach the profile. Perform this task to configure an IKEv2 profile and to implement the IKEv2 remote access server.
Use the show crypto ikev2 profile tagcommand to display the IKEv2 profile. DETAILED STEPS
Configuring the IKEv2 Name ManglerPerform this task to specify the IKEv2 name mangler, which is used to derive a name for the authorization requests. The name is derived from specified portions of different forms of remote IKE identities or the EAP identity. The name mangler specified here is referred to in the IKEv2 profile. DETAILED STEPS
Configuring IKEv2 Authorization PolicyThe IKEv2 authorization policy serves as a container of IKEv2 local AAA group authorization parameters. The IKEv2 authorization policy is referred from IKEv2 profile via the aaa authorization group command. Perform this task to configure the IKEv2 authorization policy. DETAILED STEPS
Configuring IKEv2 FragmentationPerform this task to fragment the IKEv2 packets at IKEv2 layer and to avoid fragmentation after encryption. IKEv2 peers negotiate the support for fragmentation and the MTU in the IKE_INIT exchange. Fragmentation of packets exceeding the negotiated MTU starts with IKE_AUTH exchange. DETAILED STEPS
Configuration Examples for Internet Key Exchange Version 2
Example Configuring the Proposal
Example IKEv2 Proposal with Multiple Transforms for Each Transform TypeThis example shows how to configure an IKEv2 proposal with multiple transforms for each transform type: crypto ikev2 proposal proposal-2 encryption 3des aes-cbc-128 integrity sha md5 group 2 5 The IKEv2 proposal proposal-2 shown translates to the following prioritized list of transform combinations:
Example IKEv2 Proposals on the Initiator and ResponderThe following example shows how to configure IKEv2 proposals on the initiator and the responder. The proposal on the initiator is as follows: crypto ikev2 proposal proposal-1 encryption 3des aes-cbc-128 integrity sha md5 group 2 5 The proposal on the responder is as follows: crypto ikev2 proposal proposal-2 encryption aes-cbc-128 3des peer integrity md5 sha group 5 2 The selected proposal will be as follows: encryption 3des integrity sha group 2 In the proposal shown above, the initiator and responder have conflicting preferences. In this case, the initiator is preferred over the responder. Example Configuring the Policy
Example How a Policy Is MatchedDo not configure overlapping policies. If there are multiple possible policy matches, the best match is used, as shown in the following example: crypto ikev2 policy policy1 match fvrf fvrf1 crypto ikev2 policy policy2 match fvrf fvff1 match local address 10.0.0.1 The proposal with FVRF as fvrf1 and the local-peer as 10.0.0.1 matches policy1 and policy2, but policy2 is selected because it is the best match. Example Configuring the IKEv2 Keyring
Example IKEv2 Keyring with Multiple Peer SubblocksThe following example shows how to configure an IKEv2 keyring with multiple peer subblocks: crypto ikev2 keyring keyring-1 peer peer1 description peer1 address 209.165.200.225 255.255.255.224 pre-shared-key key-1 peer peer2 description peer2 hostname peer1.example.com pre-shared-key key-2 peer peer3 description peer3 hostname peer3.example.com identity key-id abc address 209.165.200.228 255.255.255.224 pre-shared-key key-3 Example IKEv2 Keyring with Symmetric Preshared Keys Based on an IP AddressThe following example shows how to configure an IKEv2 keyring with symmetric preshared keys based on an IP address. The following is the initiatorâs keyring: crypto ikev2 keyring keyring-1 peer peer1 description peer1 address 209.165.200.225 255.255.255.224 pre-shared-key key1 The following is the responderâs keyring: crypto ikev2 keyring keyring-1 peer peer2 description peer2 address 209.165.200.228 255.255.255.224 pre-shared-key key1 Example IKEv2 Keyring with Asymmetric Preshared Keys Based on an IP AddressThe following example shows how to configure an IKEv2 keyring with asymmetric preshared keys based on an IP address. The following is the initiatorâs keyring: crypto ikev2 keyring keyring-1 peer peer1 description peer1 with asymmetric keys address 209.165.200.225 255.255.255.224 pre-shared-key local key1 pre-shared-key remote key2 The following is the responderâs keyring: crypto ikev2 keyring keyring-1 peer peer2 description peer2 with asymmetric keys address 209.165.200.228 255.255.255.224 pre-shared-key local key2 pre-shared-key remote key1 Example IKEv2 Keyring with Asymmetric Preshared Keys Based on a HostnameThe following example shows how to configure an IKEv2 keyring with asymmetric preshared keys based on the hostname. The following is the initiatorâs keyring: crypto ikev2 keyring keyring-1 peer host1 description host1 in example domain host host1.example.com pre-shared-key local key1 pre-shared-key remote key2 The following is the responderâs keyring: crypto ikev2 keyring keyring-1 peer host2 description host2 in abc domain host host2.example.com pre-shared-key local key2 pre-shared-key remote key1 Example IKEv2 Keyring with Symmetric Preshared Keys Based on an IdentityThe following example shows how to configure an IKEv2 keyring with symmetric preshared keys based on an identity: crypto ikev2 keyring keyring-4 peer abc description example domain identity fqdn example.com pre-shared-key abc-key-1 peer user1 description user1 in example domain identity email user1@example.com pre-shared-key abc-key-2 peer user1-remote description user1 example remote users identity key-id example pre-shared-key example-key-3 Example How a Keyring is MatchedThe following example shows how a keyring is matched: crypto ikev2 keyring keyring-1 peer cisco description example.com address 0.0.0.0 0.0.0.0 pre-shared-key xyz-key peer peer1 description abc.example.com address 10.0.0.0 255.255.0.0 pre-shared-key abc-key peer host1 description host1@abc.example.com address 10.0.0.1 pre-shared-key host1-example-key In the example shown, the key lookup for peer 10.0.0.1 first matches the wildcard key example-key, then the prefix key example-key and finally the host key host1-example-key. The best match host1-example-key is used. crypto ikev2 keyring keyring-2 peer host1 description host1 in abc.example.com sub-domain address 10.0.0.1 pre-shared-key host1-example-key peer host2 description example domain address 0.0.0.0 0.0.0.0 pre-shared-key example-key In the example shown, the key lookup for peer 10.0.0.1 would first match the host key host1-abc-key. Because this is a specific match, no further lookup is performed. Example Configuring the ProfileExample IKEv2 Profile Matched on Remote IdentityThe following profile caters to peers that identify themselves using fqdn example.com and authenticate with the RSA-signature using trustpoint-remote. The local node authenticates itself with a preshared key using keyring-1. crypto ikev2 profile profile2 match identity remote fqdn example.com identity local email router2@example.com authentication local pre-share authentication remote rsa-sig keyring keyring-1 pki trustpoint trustpoint-remote verify lifetime 300 dpd 5 10 on-demand virtual-template 1 Example IKEv2 Profile Catering to Two PeersThe following example shows how to configure an IKEv2 profile catering to two peers that use different authentication methods: crypto ikev2 profile profile2 match identity remote email user1@example.com match identity remote email user2@example.com identity local email router2@cisco.com authentication local rsa-sig authentication remote pre-share authentication remote rsa-sig keyring keyring-1 pki trustpoint trustpoint-local sign pki trustpoint trustpoint-remote verify lifetime 300 dpd 5 10 on-demand virtual-template 1 Example Configuring the IKEv2 Remote Access Server
Example Configuring the IKEv2 RA Server to Authenticate Peers Using EAPThis example shows how to configure the server to authenticate peers using EAP. aaa new-model ! aaa group server radius eap-server server 192.168.2.1 ! aaa authentication login eap-list group eap-server ! crypto pki trustpoint trustpoint1 enrollment url http://192.168.3.1:80 revocation-check crl ! crypto ikev2 profile ikev2-profile1 match identity remote address 0.0.0.0 authentication local rsa-sig authentication remote eap query-identity pki trustpoint trustpoint1 aaa authentication eap eap-list virtual-template 1 ! crypto ipsec transform-set transform1 esp-3des esp-sha-hmac ! crypto ipsec profile ipsec-profile1 set transform-set trans transform1 set ikev2-profile ikev2-profile1 ! interface Ethernet0/0 ip address 192.168.1.1 255.255.255.0 ! interface Virtual-Template1 type tunnel ip unnumbered Ethernet0/0 tunnel mode ipsec ipv4 tunnel protection ipsec profile ipsec-profile1 ! radius-server host 192.168.2.1 key key1 ! Example Configuring IKEv2 RA Server for Group Authorization (External AAA)The following example shows how to configure the RA server for group authentication through an external AAA, which would be the RADIUS or TACACS server. aaa new-model ! aaa group server radius cisco-acs server 192.168.2.2 ! aaa authorization network group-author-list group cisco-acs ! crypto pki trustpoint trustpoint1 enrollment url http://192.168.3.1:80 revocation-check crl ! crypto pki certificate map certmap1 1 subject-name co cisco ! crypto ikev2 name-mangler group-author-mangler dn domain ! crypto ikev2 profile ikev2-profile1 match certificate certmap1 authentication local rsa-sig authentication remote rsa-sig pki trustpoint trustpoint1 aaa authorization group group-author-list name-mangler group-author-mangler virtual-template 1 ! crypto ipsec transform-set transform1 esp-3des esp-sha-hmac ! crypto ipsec profile ipsec-profile1 set transform-set trans transform1 set ikev2-profile ikev2-profile1 ! interface Ethernet0/0 ip address 192.168.1.1 255.255.255.0 ! interface Virtual-Template1 type tunnel ip unnumbered Ethernet0/0 tunnel mode ipsec ipv4 tunnel protection ipsec profile ipsec-profile1 ! radius-server host 192.168.2.2 key key2 ! Example Configuring IKEv2 RA Server for Group Authorization (Local AAA)The following example shows how to configure the RA server for group authentication through local AAA using the AAA authorization policy. aaa new-model ! aaa authorization network local-group-author-list local ! crypto pki trustpoint trustpoint1 enrollment url http://192.168.3.1:80 revocation-check crl ! crypto pki certificate map certmap1 1 subject-name co cisco ! crypto ikev2 authorization policy author-policy1 pool pool1 dhcp server 192.168.4.1 dhcp timeout 10 dhcp giaddr 192.168.1.1 dns 10.1.1.1 10.1.1.2 subnet-acl acl1 wins 11.1.1.1 11.1.1.2 netmask 255.0.0.0 ! crypto ikev2 profile ikev2-profile1 match certificate certmap1 authentication local rsa-sig authentication remote rsa-sig pki trustpoint trustpoint1 aaa authorization group local-group-author-list author-policy1 virtual-template 1 ! crypto ipsec transform-set transform1 esp-3des esp-sha-hmac ! crypto ipsec profile ipsec-profile1 set transform-set trans transform1 set ikev2-profile ikev2-profile1 ! interface Ethernet0/0 ip address 192.168.1.1 255.255.255.0 ! interface Virtual-Template1 type tunnel ip unnumbered Ethernet0/0 tunnel mode ipsec ipv4 tunnel protection ipsec profile ipsec-profile1 ! ip local pool pool11 12.1.1.1 12.1.1.100 ! ip access-list extended acl-1 permit ip 11.12.13.0 0.0.0.255 any permit ip 15.0.0.0 0.255.255.255 any ! Example Configuring IKEv2 RA Server for User AuthorizationThe following example shows how to configure the RA server for user authentication. aaa new-model ! aaa group server radius cisco-acs server 192.168.2.2 ! aaa authorization network user-author-list group cisco-acs ! crypto pki trustpoint trustpoint1 enrollment url http:// 192.168.3.1:80 revocation-check crl ! crypto pki certificate map certmap1 1 subject-name co cisco ! crypto ikev2 name-mangler user-author-mangler dn common-name ! crypto ikev2 profile ikev2-profile1 match certificate certmap1 authentication local rsa-sig authentication remote rsa-sig pki trustpoint trustpoint1 aaa authorization user user-author-list name-mangler user-author-mangler virtual-template 1 ! crypto ipsec transform-set transform1 esp-3des esp-sha-hmac ! crypto ipsec profile ipsec-profile1 set transform-set trans transform1 set ikev2-profile ikev2-profile1 ! interface Ethernet0/0 ip address 192.168.1.1 255.255.255.0 ! interface Virtual-Template1 type tunnel ip unnumbered Ethernet0/0 tunnel mode ipsec ipv4 tunnel protection ipsec profile ipsec-profile1 ! radius-server host 192.168.2.2 key key2 ! Example Configuring Crypto Map-Based IKEv2 Peers Using Certification Authentication MethodThe following example shows how to configure crypto-map-based IKEv2 peers using the certificate authentication method between a static crypto-map IKEv2 initiator, a dynamic crypto-map IKEv2 responder, and a CA server. The initiator configuration is as follows: crypto pki trustpoint ca-server enrollment url http://10.1.1.3:80 revocation-check none ! crypto pki certificate map cmap-1 1 subject-name eq hostname = responder ! ! crypto pki certificate chain ca-server certificate 02 308201AF 30820118 A0030201 02020102 300D0609 2A864886 F70D0101 04050030 14311230 10060355 04031309 63612D73 65727665 72301E17 0D313030 33313031 32353132 355A170D 31313033 31303132 35313235 5A301A31 18301606 092A8648 86F70D01 09021609 494E4954 4941544F 52305C30 0D06092A 864886F7 0D010101 0500034B 00304802 4100A47E 8C58BA89 8CCDC5A4 5A63BD29 C331A2A5 393F4616 6B43FD2E 5ED4C81A 913E3B13 33A9B2DC CFC30391 24BB0DC8 B28FD6F1 C008D101 34C10062 30F88CF7 9D630203 010001A3 4F304D30 0B060355 1D0F0404 030205A0 301F0603 551D2304 18301680 144871D9 002C66DF D85FACB8 45D1D25F EA357455 91301D06 03551D0E 04160414 E77C74E7 183AB530 83DC531B 1DE3DA1D 914A925D 300D0609 2A864886 F70D0101 04050003 81810042 21934B77 7E485E6F EE717D75 6407B361 45190CEF E1A29CF2 6FA29E9A 5ECC1CEE B273533D 1453F6CE 1FDDA747 7E701B4B 2A2AE53F D67C2345 952325BA 30950435 0706C5EE A7A8B414 CFEEB7A2 9CD46F8F 3F663268 A20C4CCF E75D61EF 03FBA85D EDD6B26E 63653F09 F97DAFA6 6C76E44E C9CA3FDC 6CD85D30 169A1D9E 4E870B quit certificate ca 01 30820201 3082016A A0030201 02020101 300D0609 2A864886 F70D0101 04050030 14311230 10060355 04031309 63612D73 65727665 72301E17 0D313030 33313031 32343933 385A170D 31333033 30393132 34393338 5A301431 12301006 03550403 13096361 2D736572 76657230 819F300D 06092A86 4886F70D 01010105 0003818D 00308189 02818100 DA4ECE09 B998F670 598F32C1 7E9FA920 1D217AC4 293B842E 7563CE11 B2F0F822 23077930 636C8293 00F6CFDD F6C9B0F5 8348BE58 6478F631 7D44152F 494AEBCC A507FA6B 408D6BBB FAAB0A7A 2E7546A8 CA70F9A6 0F7F6824 554BD833 060D657D ABDF406C 69EEF449 7A4F9AFE 6F0852E7 05DEDAC1 D433191E 712868C2 A94E642B 02030100 01A36330 61300F06 03551D13 0101FF04 05300301 01FF300E 0603551D 0F0101FF 04040302 0186301F 0603551D 23041830 16801448 71D9002C 66DFD85F ACB845D1 D25FEA35 74559130 1D060355 1D0E0416 04144871 D9002C66 DFD85FAC B845D1D2 5FEA3574 5591300D 06092A86 4886F70D 01010405 00038181 00AFC36B 8A917284 06BD51CB 83BDC4E8 9457A361 6CAAF416 3BBEF691 04215AC5 EDBC5730 C071C2FB 8A6C90CF D6AB39C2 3BC2147F D35553D9 028B2155 802E50DB 48CDE067 B3857447 89A1C733 D81EFEF7 1115480F 70ED2F22 F27E35A1 F3BB597C 7C8F717B FAAD79D3 0F469702 DE9190E4 B1B0808E 46A118EB 887CEAEB DFE2900E D2 quit crypto ikev2 proposal prop-1 encryption 3des integrity md5 group 2 ! crypto ikev2 policy pol-1 match fvrf any proposal prop-1 ! crypto ikev2 profile prof match fvrf any match certificate cmap-1 identity local dn authentication local rsa-sig authentication remote pre-share authentication remote rsa-sig pki trustpoint ca-server ! ! crypto ipsec transform-set trans esp-3des esp-sha-hmac ! crypto map cmap 1 ipsec-isakmp set peer 209.165.200.225 set transform-set trans set ikev2-profile prof match address ikev2list ! interface Loopback0 ip address 209.165.200.226 255.255.255.224 ! interface Ethernet0/0 ip address 209.165.200.227 255.255.255.224 crypto map cmap ! interface Ethernet1/0 ip address 209.165.200.228 255.255.255.224 ! ip route 209.165.200.229 255.255.255.224 209.265.200.231 ! ip access-list extended ikev2list permit ip any any ! The responder configuration is as follows: crypto pki trustpoint ca-server enrollment url http://10.1.1.3:80 revocation-check none ! ! ! crypto pki certificate map cmap-2 1 subject-name eq hostname = initiator ! crypto pki certificate chain ca-server certificate 03 308201AF 30820118 A0030201 02020103 300D0609 2A864886 F70D0101 04050030 14311230 10060355 04031309 63612D73 65727665 72301E17 0D313030 33313031 32353231 325A170D 31313033 31303132 35323132 5A301A31 18301606 092A8648 86F70D01 09021609 52455350 4F4E4445 52305C30 0D06092A 864886F7 0D010101 0500034B 00304802 4100B517 EB8E64E1 B58CB014 07B3A6AF E6B69577 87486367 9471B1DA BC66B847 DFA5073A 82121332 E787EA2D 3C433514 39033074 4095E7C7 67A387A1 EBD24692 A76F0203 010001A3 4F304D30 0B060355 1D0F0404 030205A0 301F0603 551D2304 18301680 144871D9 002C66DF D85FACB8 45D1D25F EA357455 91301D06 03551D0E 04160414 DFF2401C 53276D96 89DE8C0A 786CCA71 C9EA792B 300D0609 2A864886 F70D0101 04050003 8181002C 6E334273 CB832A95 3DDC6293 669E416C A134D543 20952BC3 14A5C0B0 03AE011C 963AF523 C7C5C935 4FE9B2A5 F24B3161 4D0D723A FA428BD1 85ADF172 B4007067 43C27D8A 1F74ED3D DEBE9F73 1F515355 E77E766C AEACC303 39457991 29AB090C 99E21B5B 60DCB2C8 780B4479 3EB3D46B B66C8C26 15311A7A B7A4ED97 32727C quit certificate ca 01 30820201 3082016A A0030201 02020101 300D0609 2A864886 F70D0101 04050030 14311230 10060355 04031309 63612D73 65727665 72301E17 0D313030 33313031 32343933 385A170D 31333033 30393132 34393338 5A301431 12301006 03550403 13096361 2D736572 76657230 819F300D 06092A86 4886F70D 01010105 0003818D 00308189 02818100 DA4ECE09 B998F670 598F32C1 7E9FA920 1D217AC4 293B842E 7563CE11 B2F0F822 23077930 636C8293 00F6CFDD F6C9B0F5 8348BE58 6478F631 7D44152F 494AEBCC A507FA6B 408D6BBB FAAB0A7A 2E7546A8 CA70F9A6 0F7F6824 554BD833 060D657D ABDF406C 69EEF449 7A4F9AFE 6F0852E7 05DEDAC1 D433191E 712868C2 A94E642B 02030100 01A36330 61300F06 03551D13 0101FF04 05300301 01FF300E 0603551D 0F0101FF 04040302 0186301F 0603551D 23041830 16801448 71D9002C 66DFD85F ACB845D1 D25FEA35 74559130 1D060355 1D0E0416 04144871 D9002C66 DFD85FAC B845D1D2 5FEA3574 5591300D 06092A86 4886F70D 01010405 00038181 00AFC36B 8A917284 06BD51CB 83BDC4E8 9457A361 6CAAF416 3BBEF691 04215AC5 EDBC5730 C071C2FB 8A6C90CF D6AB39C2 3BC2147F D35553D9 028B2155 802E50DB 48CDE067 B3857447 89A1C733 D81EFEF7 1115480F 70ED2F22 F27E35A1 F3BB597C 7C8F717B FAAD79D3 0F469702 DE9190E4 B1B0808E 46A118EB 887CEAEB DFE2900E D2 quit crypto ikev2 proposal prop-1 encryption 3des integrity md5 group 2 ! crypto ikev2 policy pol-1 match fvrf any proposal prop-1 ! ! crypto ikev2 profile prof match fvrf any match certificate cmap-2 identity local dn authentication local rsa-sig authentication remote pre-share authentication remote rsa-sig pki trustpoint ca-server ! ! crypto ipsec transform-set trans esp-3des esp-sha-hmac ! crypto dynamic-map dmap 1 set transform-set trans set ikev2-profile prof ! ! crypto map cmap 1 ipsec-isakmp dynamic dmap interface Loopback0 ip address 209.165.200.230 255.255.255.224 ! interface Ethernet0/0 ip address 209.165.200.231 255.255.255.224 crypto map cmap ! interface Ethernet1/0 ip address 209.165.200.232 255.255.255.224 ! ip route 209.165.200.233 255.255.255.224 209.165.200.228 ! ip access-list extended ikev2list permit ip host 209.165.200.231 host 209.165.200.228 The CA server configuration is as follows: crypto pki server ca-server grant auto ! crypto pki trustpoint ca-server revocation-check crl rsakeypair ca-server ! ! crypto pki certificate chain ca-server certificate ca 01 30820201 3082016A A0030201 02020101 300D0609 2A864886 F70D0101 04050030 14311230 10060355 04031309 63612D73 65727665 72301E17 0D303930 33303831 36333335 395A170D 31323033 30373136 33333539 5A301431 12301006 03550403 13096361 2D736572 76657230 819F300D 06092A86 4886F70D 01010105 0003818D 00308189 02818100 99750598 EF4AF8B4 823DEF66 2F3BBA31 81C2DC5F D9B4040B 99FB6020 22243CD6 B9F24C84 A543D7DB DD0B3018 2E36208C D0FD4015 EAF0DA69 C1B0302B 87CEC34B 8646593F 0185AF02 0B86A3F3 5E5C3880 A992CD4A 79F13403 411CC61F 07CEB4D9 0E967CB2 FAE0A899 5A3B6C87 73111F06 128465DA A45291F8 F828C5DC 657487E7 02030100 01A36330 61300F06 03551D13 0101FF04 05300301 01FF300E 0603551D 0F0101FF 04040302 0186301F 0603551D 23041830 1680147B D032BFB7 B3F70F1A 597B7C1E 1B42E472 5CCD6030 1D060355 1D0E0416 04147BD0 32BFB7B3 F70F1A59 7B7C1E1B 42E4725C CD60300D 06092A86 4886F70D 01010405 00038181 003838FA 628804EF E9FF69D9 3D5E299C 29074B2C AE33A563 8AF75976 78FB68D4 5EF1E27B 04936FDF 78A09432 5348849D F79E17F5 70B233C9 2C1535D0 506F0C35 99335012 84BBA3DC 050FD3C9 6E7B1D63 41ACC2B5 2B02432D BA2CC2CF E379DEA0 A9C208AC 0BEBB2D8 E6488815 EB12F1E0 19072D55 D5D11A49 739144D8 271A842E ED quit ! interface Ethernet1/0 ip address 209.165.200.232 255.255.255.224 ! ip http server To obtain the CA and device certificates, enter the crypto pki authenticate ca-server and crypto pki enroll ca-servercommands. To initiate a connection between the initiator and the responder, enter the following command at the initiatorâs CLI: ping 209.165.200.230 source 209.165.200.226 The output of the command is as follows: Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 209.165.200.230, timeout is 2 seconds: Packet sent with a source address of 209.165.200.226 %IKEV2-5-OSAL_INITIATE_TUNNEL: Received request to establish an IPsec tunnel; local traffic selector = Address Range: 209.165.200.226-209.165.200.226 Protocol: 1 Port Range: 0-65535; remote traffic selector = Address Range: 209.165.200.230-209.165.200.230 Protocol: 1 Port Range: 0-65535 %IKEV2-5-SA_UP: SA UP .!!!! Success rate is 80 percent (4/5), round-trip min/avg/max = 8/11/12 ms Enter the following show commands in the responderâs CLI to display the session details: show crypto session Crypto session current status Interface: Ethernet0/0 Session status: UP-ACTIVE Peer: 1.1.1.1 port 500 IKEv2 SA: local 209.165.200.231/500 remote 209.165.200.227/500 Active IPSEC FLOW: permit ip 0.0.0.0/0.0.0.0 host 209.165.200.226 Active SAs: 2, origin: dynamic crypto map show crypto ikev2 sa detailed Tunnel-id Local Remote fvrf/ivrf Status 1 209.165.200.231/500 209.165.200.227/500 (none)/(none) READY Encr: 3DES, Hash: MD596, DH Grp:2, Auth sign: RSA, Auth verify: RSA Life/Active Time: 86400/846 sec CE id: 1001, Session-id: 1 Status Description: Negotiation done Local spi: F79756E978ED41C7 Remote spi: 188FB9A119516D34 Local id: hostname=RESPONDER Remote id: hostname=INITIATOR Local req msg id: 0 Remote req msg id: 2 Local next msg id: 0 Remote next msg id: 2 Local req queued: 0 Remote req queued: 2 Local window: 5 Remote window: 5 DPD configured for 0 seconds, retry 0 NAT-T is not detected Example Configuring Crypto-Map-Based IKEv2 Peers Using Preshared Key Authentication MethodThe following example shows how to configure crypto-map-based IKEv2 peers using the preshared key authentication method between a static crypto-map IKEv2 initiator and a dynamic crypto-map IKEv2 responder. The initiator configuration is as follows: crypto ikev2 proposal prop-1 encryption 3des integrity md5 group 2 ! crypto ikev2 policy pol-1 match fvrf any proposal prop-1 ! crypto ikev2 keyring v2-kr1 peer abc address 209.165.200.231 255.255.255.224 pre-shared-key abc ! ! ! crypto ikev2 profile prof match fvrf any match identity remote fqdn dmap-responder identity local fqdn smap-initiator authentication local pre-share authentication remote pre-share keyring v2-kr1 ! ! crypto ipsec transform-set trans esp-3des esp-sha-hmac ! crypto map cmap 1 ipsec-isakmp set peer 209.165.200.225 set transform-set trans set ikev2-profile prof match address ikev2list ! interface Loopback0 ip address 209.165.200.226 255.255.255.224 ! interface Ethernet0/0 ip address 209.165.200.227 255.255.255.224 crypto map cmap ! ip route 209.165.200.229 255.255.255.224 209.165.200.225 ! ip access-list extended ikev2list permit ip any any ! The responder configuration is as follows: crypto ikev2 proposal prop-1 encryption 3des integrity md5 group 2 ! crypto ikev2 policy pol-1 match fvrf any proposal prop-1 ! crypto ikev2 keyring v2-kr1 peer abc address 209.165.200.228 pre-shared-key abc ! ! ! crypto ikev2 profile prof match fvrf any match identity remote fqdn smap-initiator identity local fqdn dmap-responder authentication local pre-share authentication remote pre-share keyring v2-kr1 ivrf global ! ! crypto ipsec transform-set trans esp-3des esp-sha-hmac ! crypto dynamic-map dmap 1 set transform-set trans set reverse-route tag 222 set ikev2-profile prof match address ikev2list ! crypto map cmap 1 ipsec-isakmp dynamic dmap ! interface Loopback0 ip address 209.165.200.230 255.255.255.224 ! interface Ethernet0/0 ip address 209.165.200.231 255.255.255.224 crypto map cmap ! ip route 209.165.200.233 255.255.255.224 209.165.200.228 ! ip access-list extended ikev2list permit ip any any ! To initiate the connection between the initiator and the responder, enter the following command at the initiatorâs CLI: ping 209.165.200.230 source 209.165.200.226 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 209.165.200.230, timeout is 2 seconds: Packet sent with a source address of 209.165.200.226 %IKEV2-5-OSAL_INITIATE_TUNNEL: Received request to establish an IPsec tunnel; local traffic selector = Address Range: 209.165.200.226-209.165.200.226 Protocol: 1 Port Range: 0-65535; remote traffic selector = Address Range: 209.165.200.230-209.165.200.230 Protocol: 1 Port Range: 0-65535 %IKEV2-5-SA_UP: SA UP .!!!! Success rate is 80 percent (4/5), round-trip min/avg/max = 8/11/12 ms To display the session details, enter the following show commands: show crypto session Crypto session current status Interface: Ethernet0/0 Session status: UP-ACTIVE Peer: 209.165.200.225 port 500 IKEv2 SA: local 209.165.200.228/500 remote 209.165.200.231/500 Active IPSEC FLOW: permit ip 0.0.0.0/0.0.0.0 0.0.0.0/0.0.0.0 Active SAs: 2, origin: crypto map show crypto ikev2 sa detail Tunnel-id Local Remote fvrf/ivrf Status 1 209.165.200.228/500 209.165.200.231/500 (none)/(none) READY Encr: 3DES, Hash: MD596, DH Grp:2, Auth sign: PSK, Auth verify: PSK Life/Active Time: 86400/21 sec CE id: 1002, Session-id: 2 Status Description: Negotiation done Local spi: 687752902752A6FD Remote spi: C9DCCFC65493D14F Local id: smap-initiator Remote id: dmap-responder Local req msg id: 2 Remote req msg id: 0 Local next msg id: 2 Remote next msg id: 0 Local req queued: 2 Remote req queued: 0 Local window: 5 Remote window: 5 DPD configured for 0 seconds, retry 0 NAT-T is not detected Example Configuring IPsec Using sVTI-Based IKEv2 PeersThe following example shows how to configure IPsec using the preshared key authentication method between an sVTI IKEv2 initiator and an sVTI IKEv2 responder. The initiator configuration is as follows: crypto ikev2 proposal prop-1 encryption 3des integrity md5 group 2 ! crypto ikev2 policy pol-1 match fvrf any proposal prop-1 ! crypto ikev2 keyring v2-kr1 peer abc address 209.165.200.225 pre-shared-key abc ! ! ! crypto ikev2 profile prof match fvrf any match identity remote address 209.165.200.231 255.255.255.224 authentication local pre-share authentication remote pre-share keyring v2-kr1 ! ! crypto ipsec transform-set trans esp-3des esp-sha-hmac ! crypto ipsec profile ipsecprof set transform-set trans set ikev2-profile prof ! interface Loopback0 ip address 209.165.200.226 255.255.255.224 ! interface Tunnel0 ip address 10.0.0.1 255.255.255.0 tunnel source 209.165.200.231 tunnel mode ipsec ipv4 tunnel destination 209.165.200.225 tunnel protection ipsec profile ipsecprof ! interface Ethernet0/0 ip address 209.165.200.231 255.255.255.224 ! ip route 209.165.200.229 255.255.255.224 Tunnel0 ! The responder configuration is as follows: crypto ikev2 proposal prop-1 encryption 3des integrity md5 group 2 ! crypto ikev2 policy pol-1 match fvrf any proposal prop-1 ! crypto ikev2 keyring v2-kr1 peer abc address 209.165.200.231 pre-shared-key abc ! ! ! crypto ikev2 profile prof match fvrf any match identity remote address 209.165.200.231 255.255.255.224 authentication local pre-share authentication remote pre-share keyring v2-kr1 ! ! crypto ipsec transform-set trans esp-3des esp-sha-hmac ! crypto ipsec profile ipsecprof set transform-set trans set ikev2-profile prof ! crypto map cmap 1 ipsec-isakmp dynamic dmap ! interface Loopback0 ip address 209.165.200.230 255.255.255.224 ! interface Tunnel0 ip address 10.0.0.2 255.255.255.0 tunnel source 209.165.200.225 tunnel mode ipsec ipv4 tunnel destination 209.165.200.231 tunnel protection ipsec profile ipsecprof ! interface Ethernet0/0 ip address 209.165.200.231 255.255.255.224 ! ip route 209.165.200.233 255.255.255.224 Tunnel0 With sVTI on IKEv2 peers, the session is initiated only when the sVTI interfaces are enabled. In other words, network traffic is not required to initiate the session. To verify the traffic between the initiator and the responder, enter the following command at the initiatorâs CLI: ping 209.165.200.230 source 209.165.200.226 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 209.165.200.230, timeout is 2 seconds: Packet sent with a source address of 209.165.200.226 %IKEV2-5-OSAL_INITIATE_TUNNEL: Received request to establish an IPsec tunnel; local traffic selector = Address Range: 209.165.200.226-209.165.200.226 Protocol: 1 Port Range: 0-65535; remote traffic selector = Address Range: 209.165.200.230-209.165.200.23 Protocol: 1 Port Range: 0-65535 %IKEV2-5-SA_UP: SA UP .!!!! Success rate is 80 percent (4/5), round-trip min/avg/max = 8/11/12 ms Enter the following show command in the initiatorâs CLI to display the session details: show crypto session Crypto session current status Interface: Ethernet0/0 Session status: UP-ACTIVE Peer: 209.165.200.225 port 500 IKEv2 SA: local 209.165.200.231/500 remote 209.165.200.225/500 Active IPSEC FLOW: permit ip 0.0.0.0/0.0.0.0 0.0.0.0/0.0.0.0 Active SAs: 2, origin: crypto map show crypto ikev2 sa detailed Tunnel-id Local Remote fvrf/ivrf Status 1 209.165.200.231/500 209.165.200.225/500 (none)/(none) READY Encr: 3DES, Hash: MD596, DH Grp:2, Auth sign: PSK, Auth verify: PSK Life/Active Time: 86400/21 sec CE id: 1002, Session-id: 2 Status Description: Negotiation done Local spi: 687752902752A6FD Remote spi: C9DCCFC65493D14F Local id: smap-initiator Remote id: dmap-responder Local req msg id: 2 Remote req msg id: 0 Local next msg id: 2 Remote next msg id: 0 Local req queued: 2 Remote req queued: 0 Local window: 5 Remote window: 5 DPD configured for 0 seconds, retry 0 NAT-T is not detected Example Configuring Crypto Map- and dVTI-Based IKEv2 PeersThe following example shows how to configure crypto map-and dVTI-based IKEv2 peers using the preshared key authentication method between a static crypto map IKEv2 initiator and a dVTI-based IKEv2 responder. The initiator configuration is as follows: crypto ikev2 proposal prop-1 encryption 3des integrity md5 group 2 ! crypto ikev2 policy pol-1 match fvrf any proposal prop-1 ! crypto ikev2 keyring v2-kr1 peer abc address 0.0.0.0 0.0.0.0 pre-shared-key abc ! ! ! crypto ikev2 profile prof match fvrf any match identity remote address 0.0.0.0 authentication local pre-share authentication remote pre-share keyring v2-kr1 ! crypto ipsec transform-set trans esp-3des esp-sha-hmac ! crypto map cmap 1 ipsec-isakmp set peer 206.165.200.235 set transform-set trans set ikev2-profile prof match address ikev2list ! interface Loopback0 ip address 206.165.200.226 255.255.255.224 ! interface Ethernet0/0 ip address 206.165.200.227 255.255.255.224 crypto map cmap ! ip route 206.165.200.229 255.255.255.224 206.165.200.235 ! ip access-list extended ikev2list permit ip host 206.165.200.227 host 206.165.200.235 permit ip 206.165.200.233 255.255.255.224 206.165.200.229 255.255.255.224 The responder configuration is as follows: crypto ikev2 proposal prop-1 encryption 3des integrity md5 group 2 ! crypto ikev2 policy pol-1 match fvrf any proposal prop-1 ! crypto ikev2 keyring v2-kr1 peer cisco address 0.0.0.0 0.0.0.0 pre-shared-key cisco ! ! ! crypto ikev2 profile prof match fvrf any match identity remote address 0.0.0.0 authentication local pre-share authentication remote pre-share keyring v2-kr1 virtual-template 1 ! crypto ipsec transform-set set esp-3des esp-sha-hmac ! crypto ipsec profile vi set transform-set set set ikev2-profile prof ! interface Loopback0 ip address 206.165.200.230 255.255.255.224 ! interface Ethernet0/0 ip address 206.165.200.235 255.255.255.224 ! interface Virtual-Template1 type tunnel ip unnumbered Ethernet0/0 ip mtu 1000 tunnel source Ethernet0/0 tunnel mode ipsec ipv4 tunnel protection ipsec profile vi ! To initiate a connection between the initiator and the responder, enter the following command at the initiatorâs CLI: ping 206.165.200.230 source 206.165.200.226 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 206.165.200.230, timeout is 2 seconds: Packet sent with a source address of 206.165.200.226 %IKEV2-5-OSAL_INITIATE_TUNNEL: Received request to establish an IPsec tunnel; local traffic selector = Address Range: 206.165.200.226-206.165.200.226 Protocol: 1 Port Range: 0-65535; remote traffic selector = Address Range: 206.165.200.230-206.165.200.230 Protocol: 1 Port Range: 0-65535 %IKEV2-5-SA_UP: SA UP .!!!! Success rate is 80 percent (4/5), round-trip min/avg/max = 8/11/12 ms Enter the following show command in an Easy VPN server to display the session details: show crypto session Crypto session current status Interface: Virtual-Access2 Session status: UP-ACTIVE Peer: 206.165.200.227 port 500 IKEv2 SA: local 206.165.200.235/500 remote 206.165.200.227/500 Active IPSEC FLOW: permit ip 206.165.200.229/255.255.255.224 206.165.200.233/255.255.255.224 Active SAs: 2, origin: crypto map show crypto ikev2 sa detail Tunnel-id Local Remote fvrf/ivrf Status 1 206.165.200.235/500 206.165.200.227/500 (none)/(none) READY Encr: 3DES, Hash: MD596, DH Grp:2, Auth sign: PSK, Auth verify: PSK Life/Active Time: 86400/8 sec CE id: 1001, Session-id: 1 Status Description: Negotiation done Local spi: 305F610F57428834 Remote spi: D9D183B5689AEDCD Local id: 206.165.200.235 Remote id: 206.165.200.227 Local req msg id: 0 Remote req msg id: 2 Local next msg id: 0 Remote next msg id: 2 Local req queued: 0 Remote req queued: 2 Local window: 5 Remote window: 5 DPD configured for 0 seconds, retry 0 NAT-T is not detected show crypto route VPN Routing Table: Shows RRI and VTI created routes Codes: RRI - Reverse-Route, VTI- Virtual Tunnel Interface S - Static Map ACLs Routes created in table GLOBAL DEFAULT 206.165.200.233/255.255.255.224 [1/0] via 206.165.200.227 tag 0 on Virtual-Access2 RRI Example Configuring IKEv2 on DMVPN NetworksDMVPN uses a tunnel protection CLI that is identical between IKEv1 and IKEv2. The IPsec profile applied on a DMVPN tunnel only refers to an IKEv2 profile. The DMVPN Hub configuration is as follows: crypto ikev2 keyring cisco-ikev2-keyring peer dmvpn-node description symmetric pre-shared key for the hub/spoke address 0.0.0.0 0.0.0.0 pre-shared-key cisco123 crypto ikev2 profile cisco-ikev2-profile keyring cisco-ikev2-keyring authentication pre-shared match local address 0.0.0.0 crypto ipsec profile cisco-ipsec-ikev2 set transform-set cisco-ts set ikev2-profile cisco-ikev2-profile ! interface Tunnel 0 description This is the Legacy IKEv1 facing tunnel on the hub ip address 1.1.1.99 255.255.255.0 no ip redirects ip nhrp map multicast dynamic ip nhrp network-id 99 ip nhrp redirect no ip split-horizon eigrp 1 tunnel source Ethernet0/0 tunnel mode gre multipoint tunnel protection ipsec profile cisco-ipsec ! interface Tunnel1 description This would be the new IKEv2 facing tunnel on the hub ip address 2.2.2.99 255.255.255.0 no ip redirects ip nhrp map multicast dynamic ip nhrp network-id 100 no ip split-horizon eigrp 1 tunnel source Ethernet0/1 tunnel mode gre multipoint tunnel protection ipsec profile cisco-ipsec-ikev2 The IKEv2 configuration is as follows: crypto ikev2 profile cisco-ikev2-profile keyring cisco-ikev2-keyring authentication pre-shared match local address 0.0.0.0 crypto ipsec profile cisco-ipsec-ikev2 set transform-set cisco-ts set ikev2-profile cisco-ikev2-profile interface Tunnel1 ip address 2.2.2.11 255.255.255.0 no ip redirects ip nhrp map 2.2.2.99 22.22.22.99 ip nhrp map multicast 22.22.22.99 ip nhrp network-id 100 ? Keep this same for all IKEv2 spokes for clarity ip nhrp nhs 2.2.2.99 ? This points to the hubâs IKEv2 facing interface tunnel source Ethernet0/1 tunnel mode gre multipoint tunnel protection ipsec profile cisco-ipsec-ikev2 Where to Go NextAfter configuring IKEv2, proceed to configure IPsec VPNs. For more information, see the âConfiguring Security for VPNs With IPsecâ section. Additional ReferencesRelated Documents
MIBsTechnical Assistance
Feature Information for Internet Key Exchange Version 2The following table provides release information about the feature or features described in this module. This table lists only the software release that introduced support for a given feature in a given software release train. Unless noted otherwise, subsequent releases of that software release train also support that feature. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
Cisco and the Cisco Logo are trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and other countries. A listing of Cisco's trademarks can be found at www.cisco.com/go/trademarks. Third party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1005R) Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental. |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||