<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic You can run both versions at in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/changing-asa-ike-policies/m-p/2830507#M173410</link>
    <description>&lt;P&gt;You can run both versions at the same time. And that's quite a normal situation as it will often be impossible to migrate all VPNs at the same time. Though you'll most likely end up running IKEv1 with some peers and IKEv2 with others.&lt;/P&gt;</description>
    <pubDate>Wed, 13 Jan 2016 11:51:46 GMT</pubDate>
    <dc:creator>Karsten Iwen</dc:creator>
    <dc:date>2016-01-13T11:51:46Z</dc:date>
    <item>
      <title>Changing ASA IKE Policies</title>
      <link>https://community.cisco.com/t5/network-security/changing-asa-ike-policies/m-p/2830501#M173399</link>
      <description>&lt;P&gt;hi,&lt;/P&gt;
&lt;P&gt;i've been asked to replace our current "weaker" IKE phase 1 and phase 2 policies from 3DES to AES.&lt;/P&gt;
&lt;P&gt;we have active S2S VPNs that are currently using 3DES and was thinking a way to implement this with minimal downtime (or completely lock out remote access).&lt;/P&gt;
&lt;P&gt;could someone please advise if my thinking is correct? other suggestions are most welcome.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;HQ ASA:&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;no&amp;nbsp;crypto isakmp policy x &amp;nbsp; &amp;lt;&amp;lt;&amp;lt; REMOVE WEAK POLICIES&lt;/P&gt;
&lt;P&gt;crypto isakmp policy 10&lt;/P&gt;
&lt;P&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption aes&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;&amp;lt;&amp;lt; IS GROUP 5 BETTER?&lt;BR /&gt;&amp;nbsp;lifetime 43200&lt;/P&gt;
&lt;P&gt;crypto isakmp policy 65535&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;&amp;lt;&amp;lt; RETAIN A "CATCH-ALL" PHASE 1 POLICY&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption 3des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;crypto ipsec transform-set TSET esp-aes esp-sha-hmac&amp;nbsp;&amp;nbsp; &amp;lt;&amp;lt;&amp;lt; SHOULD I NEED A "CATCH-ALL" IKE PHASE 2 POLICY?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;REMOTE ASA&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;reload in 10&lt;/P&gt;
&lt;P&gt;no&amp;nbsp;crypto isakmp policy x &amp;nbsp; &amp;lt;&amp;lt;&amp;lt; REMOVE WEAK POLICIES; WILL THIS CUT ME OFF?&lt;/P&gt;
&lt;P&gt;crypto isakmp policy 10&lt;/P&gt;
&lt;P&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption aes&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 43200&lt;/P&gt;
&lt;P&gt;crypto isakmp policy 65535&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption 3des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;crypto ipsec transform-set TSET esp-aes esp-sha-hmac&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;clear crypto isakmp sa (ISSUE ON HQ ASA AFTERWARDS)&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:08:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/changing-asa-ike-policies/m-p/2830501#M173399</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2019-03-12T07:08:09Z</dc:date>
    </item>
    <item>
      <title>Hi John,</title>
      <link>https://community.cisco.com/t5/network-security/changing-asa-ike-policies/m-p/2830502#M173402</link>
      <description>&lt;P&gt;Hi John,&lt;/P&gt;
&lt;P&gt;Here is my suggestion.&lt;/P&gt;
&lt;P&gt;1. Create new crypto policy with different encry/hash and number on both end devices.&lt;/P&gt;
&lt;P&gt;ex: S2S: (group 5 preferred)&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;crypto isakmp policy 20&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;authentication pre-share&lt;BR /&gt;&lt;SPAN&gt;encryption aes&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;hash sha&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;group 5 &amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;lifetime 43200&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;For remote access:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;crypto isakmp policy 65000&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;authentication pre-share&lt;BR /&gt;&lt;SPAN&gt;encryption aes&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;hash sha&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;group 2 &amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;lifetime &lt;SPAN&gt;86400&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;Transform:&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;crypto ipsec transform-set NEWSET esp-aes esp-sha-hmac &amp;nbsp;(for site to site and remote)&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;Make sure you have remote access (SSH to outside interface) to outside interface of far end ASA.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;1. Change the Transform set on both ends. You will loose&amp;nbsp;connectivity&amp;nbsp;to remote end may have to clear existing tunnel (vpn-sessiondb l2l logoff &amp;lt;ipaddress&amp;gt;).&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;2. Make sure VPN tunnel establishes (run extended ping from one end to other end subnet).&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;3. Remove policy#10 and Policy #65535. ASAs will negotiate with new parameters.&lt;/P&gt;
&lt;P&gt;Make sure you have a maintenance window for this work. I do not see a need to reload ASAs.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;hth&lt;/P&gt;
&lt;P&gt;MS&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Jan 2016 04:19:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/changing-asa-ike-policies/m-p/2830502#M173402</guid>
      <dc:creator>mvsheik123</dc:creator>
      <dc:date>2016-01-13T04:19:07Z</dc:date>
    </item>
    <item>
      <title>In fact it's even easier:</title>
      <link>https://community.cisco.com/t5/network-security/changing-asa-ike-policies/m-p/2830503#M173404</link>
      <description>&lt;P&gt;In fact it's even easier:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Add the better Phase1 policy with a lower number.&lt;/LI&gt;
&lt;LI&gt;configure the new transform-set and place&amp;nbsp;it in&amp;nbsp;your crypto map "set transform-set" at the first place, leave the other transform-set in place.&lt;/LI&gt;
&lt;LI&gt;The next time the tunnel is rebuild or cleared, the ASAs should use the new settings. If something goes wrong, the old settings are still in place.&lt;/LI&gt;
&lt;LI&gt;When you confirmed that you are using the new settings, you can remove the old settings that are not needed any more.&lt;/LI&gt;
&lt;/OL&gt;</description>
      <pubDate>Wed, 13 Jan 2016 08:18:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/changing-asa-ike-policies/m-p/2830503#M173404</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2016-01-13T08:18:43Z</dc:date>
    </item>
    <item>
      <title>hi karsten,</title>
      <link>https://community.cisco.com/t5/network-security/changing-asa-ike-policies/m-p/2830504#M173405</link>
      <description>&lt;P&gt;hi karsten,&lt;/P&gt;
&lt;P&gt;in your step 3, do i need to force SA tear down/up (do a clear crypto isa sa)?&lt;/P&gt;</description>
      <pubDate>Wed, 13 Jan 2016 08:39:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/changing-asa-ike-policies/m-p/2830504#M173405</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2016-01-13T08:39:31Z</dc:date>
    </item>
    <item>
      <title>You don't have to, you also</title>
      <link>https://community.cisco.com/t5/network-security/changing-asa-ike-policies/m-p/2830505#M173407</link>
      <description>&lt;P&gt;You don't have to, you also can just wait. But if you have a window where you can accept a small traffic disruption, then you can clear it and directly see if it uses the new settings.&lt;/P&gt;</description>
      <pubDate>Wed, 13 Jan 2016 08:54:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/changing-asa-ike-policies/m-p/2830505#M173407</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2016-01-13T08:54:50Z</dc:date>
    </item>
    <item>
      <title>hi karsten,</title>
      <link>https://community.cisco.com/t5/network-security/changing-asa-ike-policies/m-p/2830506#M173409</link>
      <description>&lt;P&gt;hi karsten,&lt;/P&gt;
&lt;P&gt;thanks and will keep that in mind! just another quick one, i've got a mix of gen1 (using IKEv1) and next gen (IKEv2) ASA FWs. can i use IKEv1 and IKEv2 simultaneously on my HQ ASA?&lt;/P&gt;
&lt;P&gt;or is ASA limited to a single version of IKE applied on the 'outside' ASA interface?&lt;/P&gt;</description>
      <pubDate>Wed, 13 Jan 2016 11:47:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/changing-asa-ike-policies/m-p/2830506#M173409</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2016-01-13T11:47:40Z</dc:date>
    </item>
    <item>
      <title>You can run both versions at</title>
      <link>https://community.cisco.com/t5/network-security/changing-asa-ike-policies/m-p/2830507#M173410</link>
      <description>&lt;P&gt;You can run both versions at the same time. And that's quite a normal situation as it will often be impossible to migrate all VPNs at the same time. Though you'll most likely end up running IKEv1 with some peers and IKEv2 with others.&lt;/P&gt;</description>
      <pubDate>Wed, 13 Jan 2016 11:51:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/changing-asa-ike-policies/m-p/2830507#M173410</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2016-01-13T11:51:46Z</dc:date>
    </item>
    <item>
      <title>hi karsten,</title>
      <link>https://community.cisco.com/t5/network-security/changing-asa-ike-policies/m-p/2830508#M173412</link>
      <description>&lt;P&gt;hi karsten,&lt;/P&gt;
&lt;P&gt;thanks for clearing my doubts!&lt;/P&gt;
&lt;P&gt;i need to lab this up if i got the time &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Jan 2016 12:15:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/changing-asa-ike-policies/m-p/2830508#M173412</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2016-01-13T12:15:00Z</dc:date>
    </item>
    <item>
      <title>Re: Hi John,</title>
      <link>https://community.cisco.com/t5/network-security/changing-asa-ike-policies/m-p/3417198#M173413</link>
      <description>For the curious, the "reload 10" command on the remote ASA is just a fail-safe in case the tunnel doesn't come up after the changes...then you just need to sit tight for a few minutes and the device will reload with the previously saved config.</description>
      <pubDate>Tue, 17 Jul 2018 22:27:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/changing-asa-ike-policies/m-p/3417198#M173413</guid>
      <dc:creator>starman</dc:creator>
      <dc:date>2018-07-17T22:27:55Z</dc:date>
    </item>
  </channel>
</rss>

