cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
2969
Views
0
Helpful
5
Replies

How to see what transform set is in use

mickyq
Level 1
Level 1

A pen test has shown I have crackable transform set on my firewall. I can see the config this relates to and do have higher encryption available. What I dont want to do is remove it until I know my remote sites are not using it.

does any one know a command that shows all the policies/encrption in use?

Thanks

5 Replies 5

Jouni Forss
VIP Alumni
VIP Alumni

Hi,

Havent really had to do this before but first option that came to my mind was to use the following command

sh crypto ipsec sa | inc esp|current_peer

Or some similiar.

This was used on an ASA 8.2 software.

- Jouni

Thanks JouniForss.

this does show me the encrytion but I also need to know what Dh group they are using. Ideally I need to know what crypto isakmp policy is being used.

I cant find a command that will show this

you can use show crypto isakmp policy command to display the policies configured on the unit.

Hi,

To my understanding the isakmp policy on Cisco devices isnt attached to any particular VPN in anyway. They are just gone through in Priority order with the remote host/peer until a match is found. I think all the configured policys are contained in the messages that the peers send with eachother

Then again I have no idea how this is handled in devices manufactured by others. I gather there is option to configure this per connection in other devices?

Debugs would naturally tell you what Phase1 parameters are being used but might be a bit of hard to go through all VPNs depending ofcourse on your setup that we dont know.

- Jouni

mickyq
Level 1
Level 1

Thanks for the help guys.

I think using the suggested commands I can work out which policy is being used. They seem to be using the prefered policy so I can remove the one with DH group 1 and DES which is the offending item.

cheers

Mick

Review Cisco Networking for a $25 gift card