cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
7464
Views
6
Helpful
5
Replies

ASA - Can you see the used DH-Group or ISAKMP Policy?

Eric Snijders
Level 1
Level 1

Hi guys and girls,

I have a pretty simple question: is there a way to see which DH-group and/or ISAKMP policy was used in a IPsec VPN tunnel?
I know that you can see which encryption and hashing was used with "show crypto isakmp sa", but i was wondering if there was any way to see what DH-group or which ISAKMP policy (if you have multiple) was used.

1 Accepted Solution

Accepted Solutions

Hi, You can use the command show vpn-sessiondb detail l2l to identity the algorithms used, included DH group.

 

ASA-1(config-if)# show vpn-sessiondb detail l2l

Session Type: LAN-to-LAN Detailed

Connection : 3.3.3.1
Index : 8 IP Addr : 3.3.3.1
Protocol : IKEv1 IPsec
Encryption : IKEv1: (1)AES256 IPsec: (1)AES256
Hashing : IKEv1: (1)SHA1 IPsec: (1)SHA1
Bytes Tx : 400 Bytes Rx : 400
Login Time : 09:45:36 UTC Tue Mar 26 2019
Duration : 0h:00m:48s

IKEv1 Tunnels: 1
IPsec Tunnels: 1

IKEv1:
Tunnel ID : 8.1
UDP Src Port : 500 UDP Dst Port : 500
IKE Neg Mode : Main Auth Mode : preSharedKeys
Encryption : AES256 Hashing : SHA1
Rekey Int (T): 86400 Seconds Rekey Left(T): 86351 Seconds
D/H Group : 2

 

HTH

View solution in original post

5 Replies 5

Hi, You can use the command show vpn-sessiondb detail l2l to identity the algorithms used, included DH group.

 

ASA-1(config-if)# show vpn-sessiondb detail l2l

Session Type: LAN-to-LAN Detailed

Connection : 3.3.3.1
Index : 8 IP Addr : 3.3.3.1
Protocol : IKEv1 IPsec
Encryption : IKEv1: (1)AES256 IPsec: (1)AES256
Hashing : IKEv1: (1)SHA1 IPsec: (1)SHA1
Bytes Tx : 400 Bytes Rx : 400
Login Time : 09:45:36 UTC Tue Mar 26 2019
Duration : 0h:00m:48s

IKEv1 Tunnels: 1
IPsec Tunnels: 1

IKEv1:
Tunnel ID : 8.1
UDP Src Port : 500 UDP Dst Port : 500
IKE Neg Mode : Main Auth Mode : preSharedKeys
Encryption : AES256 Hashing : SHA1
Rekey Int (T): 86400 Seconds Rekey Left(T): 86351 Seconds
D/H Group : 2

 

HTH

Hi,

the same you can also check with command "sh crypto ipsec sa"
sh-crypto-ipsec-sa.png

 

 

 

 

 

 

 

 

 

Regards,

Deepak Kumar

Regards,
Deepak Kumar,
Don't forget to vote and accept the solution if this comment will help you!

Hi Deepak,

Thanks for the help! I was looking for the commando RJI supplied, but i'll be configuring PFS within a few days so definitely useful to know where to look regarding PFS.

Hi RJI,

Many thanks! I did look into the "show vpn-sessiondb detail l2l" but i just missed the D/H line. This was exactly what i was looking for!

Good to hear.

FYI, the command I provided will also identify the IPSec algorithms in use, so therefore will idenitify the PFS DH group if configured. I didn't include it in the output I previously provided, as you were only enquiring about the ISAKMP DH group.

HTH
Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community:

Review Cisco Networking products for a $25 gift card