11-18-2014 02:14 PM
Hi Everyone,
ASA 5505 has L2L tunnel to 5520.
Tunnel is up and running.
5505# sh crypto isakmp sa
IKEv1 SAs:
Active SA: 1
Rekey SA: 0 (A tunnel will report 1 Active and 1 Rekey SA during rekey)
Total IKE SA: 1
1 IKE Peer: 10.31.2.30
Type : L2L Role : initiator
Rekey : no State : MM_ACTIVE
There are no IKEv2 SAs
sh crypto ipsec sa
interface: Visitor_Edge
Crypto map tag: D_Traffic_Crypto, seq num: 1, local addr: 10.31.2.20
When i do sh conn address 10.31.2.20 all
5 in use, 9316 most used
ESP Visitor 10.31.2.30 NP Identity Ifc 10.31.2.20, idle 0:00:00, bytes 9912, flags------------1
UDP Visitor 10.31.2.30:500 NP Identity Ifc 10.31.2.20:500, idle 0:00:09, bytes 3365216, flags -------------2
ESP Visitor 10.31.2.30 NP Identity Ifc 10.31.2.20, idle 0:00:00, bytes 3816, flags-------------3
Need to understand connections 1 and 3 are used for what purpose and why they have no port info?
As connection 2 is tunnel connection using port 500.But connections 1 and 3 have no port numbers why?
Regards
Mahesh
Solved! Go to Solution.
11-18-2014 10:11 PM
Connection 1 and 3 represent outgoing and incoming ESP traffic, which are sitting directly on IP header, so there are no port info.
Connection 2 represent IKE message which is exchanging message on UDP port 500.
11-19-2014 08:22 PM
Hi David,
The main job of ESP is to provide the privacy we seek for IP datagrams by encrypting them. An encryption algorithm combines the data in the datagram with a key to transform it into an encrypted form. ESP also supports its own authentication scheme like that used in AH, or can be used in conjunction with AH.
Encapsulating Security Payload Fields
ESP has several fields, but packages its fields in a very different way. Instead of having just a header, it divides its fields into three components:
Regarding your question, the ESP protocol is to maintain the data with confidentiality, to maintain the tunnel up, you can use the ISAKMP keepalives within the tunnel group configuration.
If you have another question please let us know!
Please don´t forget to rate and mark as correct the helpful Post!
David Castro,
Regards,
11-18-2014 10:11 PM
Connection 1 and 3 represent outgoing and incoming ESP traffic, which are sitting directly on IP header, so there are no port info.
Connection 2 represent IKE message which is exchanging message on UDP port 500.
11-19-2014 08:15 AM
Hi David,
Can you please explain me in more detail about -- "Connection 1 and 3 represent outgoing and incoming ESP traffic, which are sitting directly on IP header, so there are no port info"
Is this tunnel traffic that is uses to keep tunnel up between 2 ASA's?
Regards
MAhesh
11-19-2014 08:22 PM
Hi David,
The main job of ESP is to provide the privacy we seek for IP datagrams by encrypting them. An encryption algorithm combines the data in the datagram with a key to transform it into an encrypted form. ESP also supports its own authentication scheme like that used in AH, or can be used in conjunction with AH.
Encapsulating Security Payload Fields
ESP has several fields, but packages its fields in a very different way. Instead of having just a header, it divides its fields into three components:
Regarding your question, the ESP protocol is to maintain the data with confidentiality, to maintain the tunnel up, you can use the ISAKMP keepalives within the tunnel group configuration.
If you have another question please let us know!
Please don´t forget to rate and mark as correct the helpful Post!
David Castro,
Regards,
11-20-2014 04:53 AM
Many thanks David for explaining so well.
Regards
MAhesh
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide