10-04-2017 06:34 AM - edited 03-12-2019 04:35 AM
What is the best way to ensure our ASA site to site VPN to another ASA is using NGE to protect the data?
When issuing the sh vpn-sessiondb l2l command we get the following:
Session Type: LAN-to-LAN
Connection : x.x.x.x
Index : 8075 IP Addr : x.x.x.x
Protocol : IKEv2 IPsecOverNatT
Encryption : IKEv2: (1)AES256 IPsecOverNatT: (1)DES
Hashing : IKEv2: (1)SHA512 IPsecOverNatT: (1)SHA1
Bytes Tx : 3292451979 Bytes Rx : 178875220
Login Time : 03:32:56 EDT Wed Oct 4 2017
Duration : 5h:42m:19s
Exactly what does this output mean?
Does this include Phase 1 and Phase 2 settings?
Does it mean Phase 1 settings are aes256 and Phase 2 are DES?
thanks...
Solved! Go to Solution.
10-05-2017 06:54 AM - edited 10-05-2017 02:09 PM
"none" is normal here as GCM is an "authenticated encryption". That means that the integrity-functions are build in the encryption process and there is no need to apply an additional HMAC.
Last Step: Is your PSK at least 50 characters long and really random? If yes, you are probably in the top one percent of the most secure VPNs.
10-04-2017 09:42 AM
Hello @johnf1,
Test with the command "sh vpn-sessiondb detail l2l", you will get the information for Phase 1 and Phase 2.
HTH
Gio
10-04-2017 02:36 PM
You are right with your assumption (but with IKEv2 there is no Phase1, Phase2; it's better to talk about the IKE-SA and the IPsec SAs):
The IKEv2 SA looks fine with AES256/SHA512, but your IPsec-SAs do not. Look at your crypto map what you assign with "set ikev2 ipsec-proposal". Delete all what is not needed. If you configured the VPNs with ASDM, it's very likely that you have plenty of unsecure elements in the config. You should also delete them from the CLI.
10-05-2017 05:24 AM
10-05-2017 05:39 AM
Looks much better. You can also check if your peer supports AES in GCM, AES in CBC-mode as you are using it is not considered NGE:
https://www.cisco.com/c/en/us/about/security-center/next-generation-cryptography.html
10-05-2017 06:22 AM
10-05-2017 06:54 AM - edited 10-05-2017 02:09 PM
"none" is normal here as GCM is an "authenticated encryption". That means that the integrity-functions are build in the encryption process and there is no need to apply an additional HMAC.
Last Step: Is your PSK at least 50 characters long and really random? If yes, you are probably in the top one percent of the most secure VPNs.
06-28-2023 12:38 AM
For me, the output of
show vpn-sessiondb l2l
is
Connection : ****
Index : 16456 IP Addr : ****
Protocol : IKEv2
Encryption : IKEv2: (1)AES256 Hashing : IKEv2: (1)SHA256
Bytes Tx : 0 Bytes Rx : 0
Login Time : 14:25:01 KSA Tue Jun 27 2023
Duration : 0h:00m:19s
why the value of Protocol is IKEv2 and not IKEv2 IPsecOverNatT?
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide