cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
421
Views
0
Helpful
2
Replies

Question Ref: VPN Encryption

jmia
Level 7
Level 7

I have a question that's puzzeling me, I have the below setup on my PIX 515 running Version 6.3(5) - both of the below VPN tunnels are up.

My question is...

When I do show isakmp sa detail, I observe for my VPN tunnel that is using transform-set Y456 using encryption 3des and Hash MD5, shouldn't I see:

encryption = AES and Hash = SHA as per transform-set Y456?

Has any one seen this before or am I running into a bug?

crypto ipsec transform-set X123 esp-3des esp-md5-hmac

crypto ipsec transform-set Y456 esp-aes-192 esp-sha-hmac

crypto map MYMAP 1 ipsec-isakmp

crypto map MYMAP 1 match address 103

crypto map MYMAP 1 set peer 123.456.789.100

crypto map MYMAP 1 set transform-set X123

crypto map MYMAP 2 ipsec-isakmp

crypto map MYMAP 2 match address 104

crypto map MYMAP 2 set peer 111.222.333.444

crypto map MYMAP 2 set transform-set Y456

crypto map MYMAP interface outside

isakmp enable outside

isakmp key <KEY1234> address 123.456.789.100 netmask 255.255.255.255

isakmp key <KEY5678> address 111.222.333.444 netmask 255.255.255.255

isakmp policy 1 authentication pre-share

isakmp policy 1 encryption 3des

isakmp policy 1 hash md5

isakmp policy 1 group 2

isakmp policy 1 lifetime 86400

isakmp policy 2 authentication pre-share

isakmp policy 2 encryption aes-192

isakmp policy 2 hash sha

isakmp policy 2 group 5

isakmp policy 2 lifetime 1440

EURO_FW01# sho isakmp sa det

Local Remote Encr Hash Auth State Lifetime

222.333.444.555:500 111.222.333.444:500 3des md5 psk QM_IDLE 86082

222.333.444.555:500 123.456.789.100:500 3des md5 psk QM_IDLE 9316

Thanks,

2 Replies 2

andrew.prince
Level 10
Level 10

Not really - even in the latest version of code for the ASA 7.x/8.x when you do either:-

show isakmp sa detail or show ipsec sa detail - you will just seen the specific transform set encryption/hash being used. Not the name you have given the set - that is really of no use.

michael.leblanc
Level 4
Level 4

You are confusing ISAKMP policy with IPSec policy.

The output of "show isakmp sa detail" is showing you the "ISAKMP" protection suite used for the bi-directional SA created during Phase 1.

Look at the "isakmp policy 1" parameters and you will see a match with the command output.

The transform-set you are referring to is the protection suite used for the two unidirectional IPSec SAs created during Phase II.

If you want to see the IPSec SA detail, you would likely use a command such as:

"show ipsec sa detail"