cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
7480
Views
6
Helpful
5
Replies

ASA - Can you see the used DH-Group or ISAKMP Policy?

Eric Snijders
Level 1
Level 1

Hi guys and girls,

I have a pretty simple question: is there a way to see which DH-group and/or ISAKMP policy was used in a IPsec VPN tunnel?
I know that you can see which encryption and hashing was used with "show crypto isakmp sa", but i was wondering if there was any way to see what DH-group or which ISAKMP policy (if you have multiple) was used.

1 Accepted Solution

Accepted Solutions

Hi, You can use the command show vpn-sessiondb detail l2l to identity the algorithms used, included DH group.

 

ASA-1(config-if)# show vpn-sessiondb detail l2l

Session Type: LAN-to-LAN Detailed

Connection : 3.3.3.1
Index : 8 IP Addr : 3.3.3.1
Protocol : IKEv1 IPsec
Encryption : IKEv1: (1)AES256 IPsec: (1)AES256
Hashing : IKEv1: (1)SHA1 IPsec: (1)SHA1
Bytes Tx : 400 Bytes Rx : 400
Login Time : 09:45:36 UTC Tue Mar 26 2019
Duration : 0h:00m:48s

IKEv1 Tunnels: 1
IPsec Tunnels: 1

IKEv1:
Tunnel ID : 8.1
UDP Src Port : 500 UDP Dst Port : 500
IKE Neg Mode : Main Auth Mode : preSharedKeys
Encryption : AES256 Hashing : SHA1
Rekey Int (T): 86400 Seconds Rekey Left(T): 86351 Seconds
D/H Group : 2

 

HTH

View solution in original post

5 Replies 5

Hi, You can use the command show vpn-sessiondb detail l2l to identity the algorithms used, included DH group.

 

ASA-1(config-if)# show vpn-sessiondb detail l2l

Session Type: LAN-to-LAN Detailed

Connection : 3.3.3.1
Index : 8 IP Addr : 3.3.3.1
Protocol : IKEv1 IPsec
Encryption : IKEv1: (1)AES256 IPsec: (1)AES256
Hashing : IKEv1: (1)SHA1 IPsec: (1)SHA1
Bytes Tx : 400 Bytes Rx : 400
Login Time : 09:45:36 UTC Tue Mar 26 2019
Duration : 0h:00m:48s

IKEv1 Tunnels: 1
IPsec Tunnels: 1

IKEv1:
Tunnel ID : 8.1
UDP Src Port : 500 UDP Dst Port : 500
IKE Neg Mode : Main Auth Mode : preSharedKeys
Encryption : AES256 Hashing : SHA1
Rekey Int (T): 86400 Seconds Rekey Left(T): 86351 Seconds
D/H Group : 2

 

HTH

Hi,

the same you can also check with command "sh crypto ipsec sa"
sh-crypto-ipsec-sa.png

 

 

 

 

 

 

 

 

 

Regards,

Deepak Kumar

Regards,
Deepak Kumar,
Don't forget to vote and accept the solution if this comment will help you!

Hi Deepak,

Thanks for the help! I was looking for the commando RJI supplied, but i'll be configuring PFS within a few days so definitely useful to know where to look regarding PFS.

Hi RJI,

Many thanks! I did look into the "show vpn-sessiondb detail l2l" but i just missed the D/H line. This was exactly what i was looking for!

Good to hear.

FYI, the command I provided will also identify the IPSec algorithms in use, so therefore will idenitify the PFS DH group if configured. I didn't include it in the output I previously provided, as you were only enquiring about the ISAKMP DH group.

HTH
Review Cisco Networking products for a $25 gift card