12-21-2022 07:07 AM
Hello folks.
In the below ASA VPN config, when creating, and then defining the IPsec policy...
((Create the ISAKMP policy))
#crypto ikev2 policy 1
#encryption aes-cbc-128
#integrity sha-128
#group 5
#prf sha-128
#lifetime seconds 86400
((Define the IPsec policy))
#crypto ipsec ikev2 ipsec-proposal MYCOMPANY-proposal-1
#protocol esp encryption aes-128
#protocol esp integrity sha-512
# ((do i simply add here the timeout for phase 2, and is this correct syntax-- "lifetime 28000"? If I am not understanding something here, may you please explain?))
I ask this because in the cisco ASA manual it does not mention the need (or ability) to specify a phase 2 timeout.
__________
Secondly, the client asks that the transform set "esp-aes-128-sha-hmac" be used; however, the Cisco ASA manual only examples the above config ((Define the IPsec policy)) without "hmac".
May you please show the correct additional or new config snippet that will satisfy my client's request?
Thank you!!
Solved! Go to Solution.
12-21-2022 07:17 AM
@jmaxwellUSAF the default lifetime is 28000 already. To manually configure - crypto map map-name seq-num set security-association lifetime {seconds number | kilobytes {number | unlimited}}
SHA-1 should be the HMAC variant, just not explictly defined in the CLI.
12-21-2022 07:10 AM
cisco high recommend not config lifetime for IKEv2.
so I prefer not.
for second point I will check.
12-21-2022 07:17 AM
@jmaxwellUSAF the default lifetime is 28000 already. To manually configure - crypto map map-name seq-num set security-association lifetime {seconds number | kilobytes {number | unlimited}}
SHA-1 should be the HMAC variant, just not explictly defined in the CLI.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide