07-18-2023 04:00 AM
We have some routers running Hub and Spoke DMVPN. Currently, we use the below ACL inbound on the Internet facing interface to secure the interface and allow only DMVPN.
We have a mandate to migrate from IKEv1 to IKEv2. Will the ACL still be valid? If not, can anyone suggest what lines I need to modify?
object-group network DMVPN-HUBS
host x.x.x.x
host y.y.y.y
!
object-group network NTP-SERVERS
host 95.81.173.8
host 81.128.218.110
!
ip access-list extended Internet_In
permit gre object-group DMVPN-HUBS any
permit esp object-group DMVPN-HUBS any
permit udp object-group DMVPN-HUBS eq isakmp any
permit udp object-group DMVPN-HUBS any eq isakmp
permit udp object-group NTP-SERVERS eq ntp any
deny ip any any log
!
Solved! Go to Solution.
07-18-2023 04:07 AM
IKEv1 and IKEv2 use same UDP port.
nothing need to change for your ACL
07-18-2023 04:15 AM
Both IKEv1 and IKEv2 have phase1 with different in Message number and some attribute exchange between peers.
ISAKMP is same as if you use UDP/500
07-18-2023 04:07 AM
IKEv1 and IKEv2 use same UDP port.
nothing need to change for your ACL
07-18-2023 04:12 AM
Thanks, so the below lines will match it?
permit udp object-group DMVPN-HUBS eq isakmp any
permit udp object-group DMVPN-HUBS any eq isakmp
I was asking because I assumed Ikev2 doesn't use isakmp anymore, because the command "show cry isakmp sa" doesn't work anymore with Ikev2
07-18-2023 04:15 AM
Both IKEv1 and IKEv2 have phase1 with different in Message number and some attribute exchange between peers.
ISAKMP is same as if you use UDP/500
07-18-2023 04:22 AM
Thank you for the quick solution
07-18-2023 04:34 AM
You are so welcome
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide