08-22-2019 10:59 AM - edited 02-21-2020 09:25 AM
Hello,
I am using an ASA 5545 with a 9.8(2)38 IOS and during an audit using Nipper I got flagged for aggressive mode being enabled.
I can't find AM or aggressive (or MM or Main Mode) anywhere in the show run or the sh crypto isakmp sa detail.
So how do I know for sure my VPN is using aggressive mode or not?
Thanks
08-22-2019 11:42 AM
Hi,
The command "crypto ikev1 am-disable" disables aggressive mode, if you don't see this command in your configuration then aggressive mode is enabled. To enable it you use "no crypto ikev1 am-disable" < this is on by default, it is NOT displayed in the configuration.
Use "show crypto isakmp sa" and check the state, which is probably MM_ACTIVE - which means it used Main Mode. If not using Main Mode, it would start AM_ for aggressive mode.
ASA-2(config-tunnel-ipsec)# show crypto isakmp sa
IKEv1 SAs:
Active SA: 1
Rekey SA: 0 (A tunnel will report 1 Active and 1 Rekey SA during rekey)
Total IKE SA: 1
1 IKE Peer: 1.1.1.1
Type : L2L
Role : initiator
Rekey : no
State : MM_ACTIVE
08-22-2019 12:30 PM
Hello RJI,
I notice you have that
show crypto isakmp sa
inside of the config mode. I am looking for a command I can just run from privileged mode. I'm not the main Cisco person and I am just looking to verify without taking the chance of messing up a config.
Using show crypto isakmp sa I do see that my ASA is the initiator but I don't see State : anywhere.
Just curious if this is the default and my ASA is accepting Main Mode or Aggressive Mode connections.
Thanks
08-22-2019 12:40 PM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide