01-16-2023 01:27 PM - edited 01-16-2023 03:29 PM
Hello.
On an ASA 5525, is...
#crypto ipsec ikev2 ipsec-proposal PROPOSAL-1
#protocol esp encryption aes-256
#protocol esp integrity sha-512
...the same as...
#crypto ipsec ikev2 ipsec-proposal PROPOSAL-1
#crypto ipsec ikev2 transform-set VENDOR1 esp-aes-256 esp-sha-hmac
?
In "#crypto ipsec ikev2 transform-set VENDOR1 esp-aes-256 esp-sha-hmac" where is / where should be input, the data "sha-512"?
Does the above "VENDOR1" associate with anything else in the config?
Thank you!
Solved! Go to Solution.
01-16-2023 02:14 PM - edited 01-16-2023 02:27 PM
@MicJameson1 on an ASA - crypto ipsec ikev2 ipsec-proposal PROPOSAL-1 defines the encryption/integrity algorithms to establish the IPSec SA.
crypto ipsec ikev2 transform-set VENDOR1 esp-aes-256 esp-sha-hmac is incorrect as @MHM Cisco World said. When using IKEv1 you use the transform-set syntax but in IKEv2 you use ipsec-proposal (as per first example)....both establish IPSec SA.
You reference the IKEv2 proposal under the crypto map or under the IPSec profile, which is then referenced under the VTI.
crypto map CMAP 10 set ikev2 ipsec-proposal PROPOSAL-1
or
crypto ipsec profile IPSEC_PROFILE
set ikev2 ipsec-proposal PROPOSAL-1
It is not the same as IKEv1 Policy (to establish IKE SA), the following establishes IKEv2 SA on the ASA.
crypto ikev2 policy 5
encryption aes-256
integrity sha512 sha384
group 19 14
prf sha512 sha384
lifetime seconds 86400
01-16-2023 01:32 PM - edited 01-16-2023 01:41 PM
crypto ipsec ikev2 ipsec-proposal PROPOSAL-1 <<- this command I think is typo wrong, I think it proposal not ipsec-proposal
and this command after correction is same as
crypto isakmp policy <<- phase1 of IKEv1 for router
crypto ikev1 policy <<- phase1 of IKEv1 of ASA
01-16-2023 02:25 PM - edited 01-16-2023 02:39 PM
Yes @Rob Ingram correct me, there are two command
crypto ipsec ikev2 ipsec-proposal <<- this for phase2 in ASA
crypto ikev2 proposal <<- this for phase1 in Router
01-16-2023 02:34 PM - edited 01-16-2023 02:36 PM
Correct, "crypto ipsec ikev2 ipsec-proposal" is used on the ASA to establish IPSec SA
almost correct for IOS router, there no "ipsec" syntax in the command, which defines the algorithms used for SA_INIT (phase 1) to establish IKE SA.
crypto ikev2 proposal PROP-1
encryption aes-cbc-256
integrity sha512 sha384
group 19 14
!
crypto ikev2 policy IKEV2_POLICY
proposal PROP-1
This can be confusing with the use of "proposal" on the different platforms.
01-16-2023 02:38 PM
Yes a lot, IKEv1 vs IKEv2 then the command is different for each platform.
thanks for you note.
01-16-2023 01:35 PM
You need to provide what device is this ASA or Router, some time some old device does not support some features.
and you looking VTI tunnel ? or only 1 Tunnel ?
01-16-2023 03:28 PM
ASA 5525
01-16-2023 02:14 PM - edited 01-16-2023 02:27 PM
@MicJameson1 on an ASA - crypto ipsec ikev2 ipsec-proposal PROPOSAL-1 defines the encryption/integrity algorithms to establish the IPSec SA.
crypto ipsec ikev2 transform-set VENDOR1 esp-aes-256 esp-sha-hmac is incorrect as @MHM Cisco World said. When using IKEv1 you use the transform-set syntax but in IKEv2 you use ipsec-proposal (as per first example)....both establish IPSec SA.
You reference the IKEv2 proposal under the crypto map or under the IPSec profile, which is then referenced under the VTI.
crypto map CMAP 10 set ikev2 ipsec-proposal PROPOSAL-1
or
crypto ipsec profile IPSEC_PROFILE
set ikev2 ipsec-proposal PROPOSAL-1
It is not the same as IKEv1 Policy (to establish IKE SA), the following establishes IKEv2 SA on the ASA.
crypto ikev2 policy 5
encryption aes-256
integrity sha512 sha384
group 19 14
prf sha512 sha384
lifetime seconds 86400
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide