<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IPSEC Tunnel - Understanding Phase 1 and Phase 2 in simple words in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ipsec-tunnel-understanding-phase-1-and-phase-2-in-simple-words/m-p/4389532#M1080126</link>
    <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1162274"&gt;@LovejitSingh130013&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Phase 1 establishes an IKE Security Associations (SA) these IKE SAs are then used to securely negotiate the IPSec SAs (Phase 2). Data is transmitted securely using the IPSec SAs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Phase 1 = "show crypto isakmp sa" or "show crypto ikev1 sa" or "show crypto ikev2 sa"&lt;/P&gt;
&lt;P&gt;Phase 2 = "show crypto ipsec sa"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To confirm data is actually sent and received over the VPN, check the output of "show crypto ipsec sa" and confirm the counters for encaps|decaps are increasing.&lt;/P&gt;</description>
    <pubDate>Mon, 19 Apr 2021 16:26:49 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2021-04-19T16:26:49Z</dc:date>
    <item>
      <title>IPSEC Tunnel - Understanding Phase 1 and Phase 2 in simple words</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-tunnel-understanding-phase-1-and-phase-2-in-simple-words/m-p/4389521#M1080124</link>
      <description>&lt;P&gt;Hello Experts&amp;nbsp;&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326046"&gt;@Marvin Rhoads&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/335410"&gt;@Rob&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/287680"&gt;@Sheraz.Salim&lt;/a&gt;&amp;nbsp; &amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/286878"&gt;@balaji.bandi&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/292493"&gt;@Mohammed al Baqari&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326229"&gt;@Richard Burts&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Whenever I configure IPsec tunnels, I checked Phase DH group and encryptions (DES/AES/SHA etc) and in Phase 2 select the local and remote subnets with same encryption.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What does specifically phase one does ?&amp;nbsp; on Cisco ASA which command i can use to see if phase 1 is operational/up?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What does specifically phase two does ? on cisco ASA which command I can use to see if phase 2 is up/operational ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;Lovejit&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Apr 2021 16:10:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-tunnel-understanding-phase-1-and-phase-2-in-simple-words/m-p/4389521#M1080124</guid>
      <dc:creator>LovejitSingh130013</dc:creator>
      <dc:date>2021-04-19T16:10:58Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC Tunnel - Understanding Phase 1 and Phase 2 in simple words</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-tunnel-understanding-phase-1-and-phase-2-in-simple-words/m-p/4389532#M1080126</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1162274"&gt;@LovejitSingh130013&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Phase 1 establishes an IKE Security Associations (SA) these IKE SAs are then used to securely negotiate the IPSec SAs (Phase 2). Data is transmitted securely using the IPSec SAs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Phase 1 = "show crypto isakmp sa" or "show crypto ikev1 sa" or "show crypto ikev2 sa"&lt;/P&gt;
&lt;P&gt;Phase 2 = "show crypto ipsec sa"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To confirm data is actually sent and received over the VPN, check the output of "show crypto ipsec sa" and confirm the counters for encaps|decaps are increasing.&lt;/P&gt;</description>
      <pubDate>Mon, 19 Apr 2021 16:26:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-tunnel-understanding-phase-1-and-phase-2-in-simple-words/m-p/4389532#M1080126</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-04-19T16:26:49Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC Tunnel - Understanding Phase 1 and Phase 2 in simple words</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-tunnel-understanding-phase-1-and-phase-2-in-simple-words/m-p/4389646#M1080137</link>
      <description>&lt;P&gt;as Rob mentioned he is right.but just to put you in more specific point of direction&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;What does specifically phase one does ? on Cisco ASA which command i can use to see if phase 1 is operational/up?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;- show crypto isakmp sa details | b x.x.x.x.x&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; where x.x.x.x is your remote peer ip address.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;What does specifically phase two does ? on cisco ASA which command I can use to see if phase 2 is up/operational ?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;-&lt;/STRONG&gt;show crypto ipsec sa peer x.x.x.x.x&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;also you can use the command on ASA&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;show vpn-sessiondb detail l2l filter ipaddress x.x.x.x.x&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;This command will show you the in full detail of phase 1 setting and phase 2 setting.&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Apr 2021 20:10:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-tunnel-understanding-phase-1-and-phase-2-in-simple-words/m-p/4389646#M1080137</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2021-04-19T20:10:39Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC Tunnel - Understanding Phase 1 and Phase 2 in simple words</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-tunnel-understanding-phase-1-and-phase-2-in-simple-words/m-p/4389724#M1080138</link>
      <description>&lt;P&gt;Encrypt inside Encrypt.&amp;nbsp;&lt;BR /&gt;first Encrypt use the Private/Public Asymmetric Algorithm to be more secure But this is very slow.&lt;BR /&gt;Second encrypt use mostly the PSK Symmetric Algorithm this is Fast but not so sure this is why we need the first encrypt to protect it.&lt;/P&gt;</description>
      <pubDate>Tue, 20 Apr 2021 01:02:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-tunnel-understanding-phase-1-and-phase-2-in-simple-words/m-p/4389724#M1080138</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2021-04-20T01:02:01Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC Tunnel - Understanding Phase 1 and Phase 2 in simple words</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-tunnel-understanding-phase-1-and-phase-2-in-simple-words/m-p/4390062#M1080155</link>
      <description>&lt;P&gt;&lt;FONT color="#000000"&gt;Well, just to add my two cents.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#000000"&gt;&lt;EM&gt;&lt;STRONG&gt;What does specifically phase one does ?&amp;nbsp; on Cisco ASA which command i can use to see if phase 1 is operational/up?&lt;/STRONG&gt;&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#000000"&gt;&lt;SPAN&gt;As Rob has already mentioned, this part of the process establishes a tunnel to securely agree upon the encryption keys to be used when encrypting traffic.&amp;nbsp; So I like think of this as a type of management tunnel.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#000000"&gt;&lt;SPAN&gt;commands to be used here are:&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#000000"&gt;&lt;SPAN&gt;show crypto ikev1 sa&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#000000"&gt;&lt;SPAN&gt;show crypto ikev2 sa&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#000000"&gt;&lt;EM&gt;&lt;STRONG&gt;What does specifically phase two does ? on cisco ASA which command I can use to see if phase 2 is up/operational ?&lt;/STRONG&gt;&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#000000"&gt;&lt;SPAN&gt;This is where the VPN devices agree upon what method will be used to encrypt data traffic.&amp;nbsp; The keys, or security associations, will be exchanged using the tunnel established in phase 1.&amp;nbsp; Once this exchange is successful all data traffic will be encrypted using this second tunnel.&amp;nbsp; The only time phase 1 tunnel will be used again is for the rekeys.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#000000"&gt;commands to use:&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#000000"&gt;show crypto ipsec sa peer x.x.x.x !(where x.x.x.x is the IP of the remote peer)&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Apr 2021 12:38:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-tunnel-understanding-phase-1-and-phase-2-in-simple-words/m-p/4390062#M1080155</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2021-04-20T12:38:45Z</dc:date>
    </item>
  </channel>
</rss>

