<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Vulnerability in router C2921 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/vulnerability-in-router-c2921/m-p/4582928#M1088816</link>
    <description>&lt;P&gt;The following four modes are found in IKE main mode&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;MM_NO_STATE&lt;/STRONG&gt;* – ISAKMP SA process has started but has not continued to form (typically due to a connectivity issue with the peer)&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;MM_SA_SETUP&lt;/STRONG&gt;* – Both peers agree on ISAKMP SA parameters and will move along the process&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;MM_KEY_EXCH&lt;/STRONG&gt;* – Both peers exchange their DH keys and are generating their secret keys. (This state could also mean there is a mis-matched authentication type or PSK, if it does not proceed to the next step)&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;MM_KEY_AUTH&lt;/STRONG&gt;* – ISAKMP SA’s have been authenticated in main mode and will proceed to QM_IDLE&amp;nbsp;immediately.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;The following three modes are found in IKE aggressive mode&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;AG_NO_STATE&lt;/STRONG&gt;** –&amp;nbsp;ISAKMP SA process has started but has not continued to form (typically do to a connectivity issue with the peer)&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;AG_INIT_EXCH&lt;/STRONG&gt;** – Peers have exchanged their first set of packets in&amp;nbsp;aggressive&amp;nbsp;mode, but have not authenticated yet.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;AG_AUTH&lt;/STRONG&gt;** –&amp;nbsp;ISAKMP SA’s have been authenticated in&amp;nbsp;aggressive&amp;nbsp;mode and will proceed to QM_IDLE&amp;nbsp;immediately.&lt;/LI&gt;
&lt;/UL&gt;</description>
    <pubDate>Thu, 31 Mar 2022 10:27:59 GMT</pubDate>
    <dc:creator>balaji.bandi</dc:creator>
    <dc:date>2022-03-31T10:27:59Z</dc:date>
    <item>
      <title>Vulnerability in router C2921</title>
      <link>https://community.cisco.com/t5/network-security/vulnerability-in-router-c2921/m-p/4582029#M1088772</link>
      <description>&lt;P&gt;Hi We have a router C2921. When tenable scan vulnerability, we got the following info. Not sure if its vpn configuration issue. Anyone can provide suggestions to resolve it? Thank you&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;of a VPN gateway and gain unauthorized access to private networks.&lt;/P&gt;&lt;P&gt;The remote Internet Key Exchange (IKE) version 1 service seems to&lt;/P&gt;&lt;P&gt;- Disable Aggressive Mode if supported.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 31 Mar 2022 16:48:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vulnerability-in-router-c2921/m-p/4582029#M1088772</guid>
      <dc:creator>Leftz</dc:creator>
      <dc:date>2022-03-31T16:48:11Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability in router C2921</title>
      <link>https://community.cisco.com/t5/network-security/vulnerability-in-router-c2921/m-p/4582037#M1088773</link>
      <description>&lt;P&gt;Can you post the output :&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;show crypto ikev1 sa&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Mar 2022 15:09:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vulnerability-in-router-c2921/m-p/4582037#M1088773</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2022-03-30T15:09:27Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability in router C2921</title>
      <link>https://community.cisco.com/t5/network-security/vulnerability-in-router-c2921/m-p/4582038#M1088774</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1190993"&gt;@Leftz&lt;/a&gt; it may show up as vulnerable in a report, but unless you have an IKEv1 remote access VPN it's likely not a problem.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Aggressive mode can be disabled using - "&lt;SPAN&gt;crypto isakmp aggressive-mode disable&lt;/SPAN&gt;"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Use IKEv2 which does not use aggressive mode.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Mar 2022 15:13:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vulnerability-in-router-c2921/m-p/4582038#M1088774</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-03-30T15:13:10Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability in router C2921</title>
      <link>https://community.cisco.com/t5/network-security/vulnerability-in-router-c2921/m-p/4582072#M1088777</link>
      <description>&lt;P&gt;Thank you for your reply.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/286878"&gt;@balaji.bandi&lt;/a&gt;,&amp;nbsp;command&amp;nbsp;&lt;STRONG&gt;show crypto ikev2 sa&lt;/STRONG&gt; shows nothing there. and command&amp;nbsp;&lt;STRONG&gt;show crypto ikev1 sa&lt;/STRONG&gt; cannot be used&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;,&amp;nbsp;&lt;SPAN&gt;Aggressive mode can be disabled using - "&lt;/SPAN&gt;&lt;SPAN&gt;crypto isakmp aggressive-mode disable&lt;/SPAN&gt;&lt;SPAN&gt;" ---- Can this command impact something else?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Mar 2022 15:44:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vulnerability-in-router-c2921/m-p/4582072#M1088777</guid>
      <dc:creator>Leftz</dc:creator>
      <dc:date>2022-03-30T15:44:43Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability in router C2921</title>
      <link>https://community.cisco.com/t5/network-security/vulnerability-in-router-c2921/m-p/4582076#M1088778</link>
      <description>&lt;P&gt;can you post your config to look what tunnel configured here.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Mar 2022 15:50:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vulnerability-in-router-c2921/m-p/4582076#M1088778</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2022-03-30T15:50:33Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability in router C2921</title>
      <link>https://community.cisco.com/t5/network-security/vulnerability-in-router-c2921/m-p/4582079#M1088779</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1190993"&gt;@Leftz&lt;/a&gt; use "show crypto isakmp sa" if "show crypto ikev1 sa" cannot be used.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As stated aggressive mode is only used with ikev1 remote access vpn. If you provide the output of "show crypto isakmp sa" it will determine whether Main Mode (MM) or Agressive Mode (AM) was used.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Mar 2022 15:53:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vulnerability-in-router-c2921/m-p/4582079#M1088779</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-03-30T15:53:29Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability in router C2921</title>
      <link>https://community.cisco.com/t5/network-security/vulnerability-in-router-c2921/m-p/4582200#M1088792</link>
      <description>&lt;P&gt;Please see the below:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;A01#show crypto isakmp sa&lt;BR /&gt;IPv4 Crypto ISAKMP SA&lt;BR /&gt;dst src state conn-id status&lt;BR /&gt;5.1.1.8 3.2.2.2 MM_NO_STATE 0 ACTIVE&lt;BR /&gt;5.1.1.8 3.2.2.2 MM_NO_STATE 0 ACTIVE (deleted)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Mar 2022 19:43:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vulnerability-in-router-c2921/m-p/4582200#M1088792</guid>
      <dc:creator>Leftz</dc:creator>
      <dc:date>2022-03-30T19:43:25Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability in router C2921</title>
      <link>https://community.cisco.com/t5/network-security/vulnerability-in-router-c2921/m-p/4582244#M1088796</link>
      <description>&lt;P&gt;as suggest you using MM - so you can delete :&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;crypto isakmp aggressive-mode disable&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Mar 2022 20:59:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vulnerability-in-router-c2921/m-p/4582244#M1088796</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2022-03-30T20:59:55Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability in router C2921</title>
      <link>https://community.cisco.com/t5/network-security/vulnerability-in-router-c2921/m-p/4582252#M1088799</link>
      <description>&lt;P&gt;What aggressive mode should be like when using command&amp;nbsp;&lt;SPAN&gt;show crypto isakmp sa? Thank you&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Mar 2022 21:18:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vulnerability-in-router-c2921/m-p/4582252#M1088799</guid>
      <dc:creator>Leftz</dc:creator>
      <dc:date>2022-03-30T21:18:35Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability in router C2921</title>
      <link>https://community.cisco.com/t5/network-security/vulnerability-in-router-c2921/m-p/4582928#M1088816</link>
      <description>&lt;P&gt;The following four modes are found in IKE main mode&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;MM_NO_STATE&lt;/STRONG&gt;* – ISAKMP SA process has started but has not continued to form (typically due to a connectivity issue with the peer)&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;MM_SA_SETUP&lt;/STRONG&gt;* – Both peers agree on ISAKMP SA parameters and will move along the process&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;MM_KEY_EXCH&lt;/STRONG&gt;* – Both peers exchange their DH keys and are generating their secret keys. (This state could also mean there is a mis-matched authentication type or PSK, if it does not proceed to the next step)&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;MM_KEY_AUTH&lt;/STRONG&gt;* – ISAKMP SA’s have been authenticated in main mode and will proceed to QM_IDLE&amp;nbsp;immediately.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;The following three modes are found in IKE aggressive mode&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;AG_NO_STATE&lt;/STRONG&gt;** –&amp;nbsp;ISAKMP SA process has started but has not continued to form (typically do to a connectivity issue with the peer)&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;AG_INIT_EXCH&lt;/STRONG&gt;** – Peers have exchanged their first set of packets in&amp;nbsp;aggressive&amp;nbsp;mode, but have not authenticated yet.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;AG_AUTH&lt;/STRONG&gt;** –&amp;nbsp;ISAKMP SA’s have been authenticated in&amp;nbsp;aggressive&amp;nbsp;mode and will proceed to QM_IDLE&amp;nbsp;immediately.&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Thu, 31 Mar 2022 10:27:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vulnerability-in-router-c2921/m-p/4582928#M1088816</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2022-03-31T10:27:59Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability in router C2921</title>
      <link>https://community.cisco.com/t5/network-security/vulnerability-in-router-c2921/m-p/4583153#M1088829</link>
      <description>&lt;P&gt;Thank you balaji. Can we say both modes: main mode and aggressive mode are enabled at the same time by default, or just have to be ONE mode enabled?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 31 Mar 2022 15:50:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vulnerability-in-router-c2921/m-p/4583153#M1088829</guid>
      <dc:creator>Leftz</dc:creator>
      <dc:date>2022-03-31T15:50:54Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability in router C2921</title>
      <link>https://community.cisco.com/t5/network-security/vulnerability-in-router-c2921/m-p/4583158#M1088830</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1190993"&gt;@Leftz&lt;/a&gt; yes both MM and AM are enabled as default in IKEv1, you need to explictly disable the command previously provided.&lt;/P&gt;
&lt;P&gt;AM is legacy and generally only used for IKEv1 Remote Access VPN.&lt;/P&gt;
&lt;P&gt;From your output you've confirmed your VPN are using MM, so AM is not in use.&lt;/P&gt;</description>
      <pubDate>Thu, 31 Mar 2022 15:55:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vulnerability-in-router-c2921/m-p/4583158#M1088830</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-03-31T15:55:14Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability in router C2921</title>
      <link>https://community.cisco.com/t5/network-security/vulnerability-in-router-c2921/m-p/4587432#M1088998</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;&amp;nbsp; Thank you for your explanation!&lt;/P&gt;&lt;P&gt;Actually there are three kinds of mode in the device. MM, AM, and Quick mode. The QM is similar with AM. So in this device, can we still&amp;nbsp; disable AM?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Apr 2022 15:54:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vulnerability-in-router-c2921/m-p/4587432#M1088998</guid>
      <dc:creator>Leftz</dc:creator>
      <dc:date>2022-04-06T15:54:56Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability in router C2921</title>
      <link>https://community.cisco.com/t5/network-security/vulnerability-in-router-c2921/m-p/4587436#M1088999</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1190993"&gt;@Leftz&lt;/a&gt; no that's incorrect AM is not simlar to QM. AM or MM are used in IKEv1 Phase 1 to form the IKE SA.&lt;/P&gt;
&lt;P&gt;QM is used in Phase 2 to form the IPSec SA, which can only be established if the IKE SA has been successfully formed using MM/AM.&lt;/P&gt;</description>
      <pubDate>Wed, 06 Apr 2022 16:28:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vulnerability-in-router-c2921/m-p/4587436#M1088999</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-04-06T16:28:36Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability in router C2921</title>
      <link>https://community.cisco.com/t5/network-security/vulnerability-in-router-c2921/m-p/4587603#M1089006</link>
      <description>&lt;P&gt;Thank you Rob. You are right. Looks like "QM_IDLE" is only expression of active tunnel,&amp;nbsp; but when it show "QM_IDLE" with command show crypto isakmp sa, how can we know if it is MM or AM since MA or AM can go into QM?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Apr 2022 20:08:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vulnerability-in-router-c2921/m-p/4587603#M1089006</guid>
      <dc:creator>Leftz</dc:creator>
      <dc:date>2022-04-06T20:08:36Z</dc:date>
    </item>
  </channel>
</rss>

