11-12-2020 12:35 PM
Hi,
Currently going through STIG checks.
How would I go about checking the idle timeouts on my ipsec connections?
In CLI I don't see one configured when I use "show run crypto ipsec"
Does that mean a Default of 1 hour is in place?
Thanks for your time.
Stig V-30961 - The VPN gateway must implement IPSec security associations that terminate after one hour or less of idle time.
"Review all IPSec Security Associations configured globally or within IPSec profiles on the VPN gateway and examine the configured idle time. The idle time value must be 1 hour or less. If idle time is not configured, determine the default used by the gateway. "
Solved! Go to Solution.
11-12-2020 12:52 PM - edited 11-12-2020 12:59 PM
Hi @K-Grev
If you've got active tunnels, run the command "show crypto ipsec sa" and/or "show vpn-sessiondb detailed l2l" from there you can check the timers for those active SAs.
The default lifetimes are 28,800 seconds (eight hours) and 4,608,000 kilobytes (10 megabytes per second for one hour).
Specify an SA lifetime for the crypto map if you want to override the global lifetime.
crypto map map-name seq-num set security-association lifetime {seconds number | kilobytes {number | unlimited}}
11-12-2020 12:52 PM - edited 11-12-2020 12:59 PM
Hi @K-Grev
If you've got active tunnels, run the command "show crypto ipsec sa" and/or "show vpn-sessiondb detailed l2l" from there you can check the timers for those active SAs.
The default lifetimes are 28,800 seconds (eight hours) and 4,608,000 kilobytes (10 megabytes per second for one hour).
Specify an SA lifetime for the crypto map if you want to override the global lifetime.
crypto map map-name seq-num set security-association lifetime {seconds number | kilobytes {number | unlimited}}
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide