Table Of Contents
C7200 VSA (VPN Services Adapter)
Basic IPSec Configuration Example
Related Features and Technologies
Supported Standards, MIBs, and RFCs
Using the EXEC Command Interpreter
Enabling/Disabling the VSA (Optional)
Disabling the VSA during Operation
Selecting Appropriate Transforms
The Crypto Transform Configuration Mode
Ensuring That Access Lists Are Compatible with IPSec
Setting Global Lifetimes for IPSec Security Associations
Applying Crypto Map Sets to Interfaces
Verifying IPSec Configurations
Configuring IKE Policies Example
C7200 VSA (VPN Services Adapter)
Revised: September 12, 2006, OL-6695-02Feature History
Release ModificationRelease 1.0
This feature was introduced on the Cisco 7204VXR and Cisco 7206VXR routers with the NPE-G2 processor.
This feature module describes the VPN Services Adapter (VSA) feature. It includes the following sections:
•Supported Standards, MIBs, and RFCs
Feature Overview
The C7200 VSA (VPN Services Adapter) is a full-width service adapter supported in the I/O slot of the Cisco 7204VXR and Cisco 7206VXR routers with the NPE-G2 processor.
The VSA features hardware acceleration for Advanced Encryption Standard (AES), Data Encryption Standard (DES), and Triple DES (3DES), providing increased performance for site-to-site and remote-access IPSec VPN services. The Cisco VSA supports full Layer 3 routing, quality of service (QoS), multicast and multiprotocol traffic, and broad support of integrated LAN/WAN media.
The AES is a Federal Information Processing Standard (FIPS) Publication that specifies a cryptographic algorithm for use by U.S. government organizations to protect sensitive information. AES is used on a voluntary basis by organizations, institutions, and individuals outside of the U.S. government and the United States. AEF is used by many European organizations.
The VSA provides hardware-accelerated support for multiple encryption functions:
•128/192/256-bit AES in hardware
•DES standard mode with 56-bit key: Cipher Block Chaining (CBC)
•Performance to 900 Mbps encrypted throughput with 300-byte packets and 1000 tunnels
•5000 tunnels for DES/3DES/AES
•Secure Hash Algorithm1 (SHA-1) and Message Digest 5 (MD5) hash algorithms
•Rivest, Shamir, Adelman (RSA) public-key algorithm
•Diffie-Hellman Groups 1, 2 and 5
Benefits
The VSA provides the following benefits:
•IPSec performance to 900 Mbps encrypted throughput
•IPSec scalability, consistent throughput from 1 to 5000 tunnels
•Avoids competition for valuable PCI bandwidth points with other interface port adapters, effectively increasing useful bandwidth to other port adapters
•Up to 50 tunnels per second
•The number of tunnels depends on the corresponding memory of the NPE (for example, currently 5000 tunnels with 1 GB of memory)
•RSA encryption
•Accelerated Crypto performance
•Accelerated Internet Key Exchange (IKE): RFCs 2401-2411 and 2451
•Support for automatic authentication using digital certificates
•Encryption services to any interface port adapter installed in the router
•LAN/WAN interface selection: Works with all Cisco 7200VXR-NPE-G2 compatible port adapters
•QoS, multiprotocol, and multicast feature interoperation
•Support for full Layer 3 routing, such as Enhanced Interior Gateway Routing Protocol (EIGRP), Open Shortest Path First (OSPF), and Border Gateway Protocol (BGP) across the IPSec VPN
•VPN initialization improvements
Hardware Requirements
The hardware required to ensure proper operation of the VSA is as follows:
•The VSA is compatible with the Cisco NPE-G2 processor on the Cisco 7204VXR or Cisco 7206VXR routers.
Restrictions
The VSA has the following restrictions:
•VSA does not interoperate with other ISA or VAM/VAM2/VAM2+ crypto cards in the same router; the VAM/VAM2/VAM2+ crypto cards become disabled when the VSA is active in the Cisco 7200VXR series routers with the NPE-G2 processor.
•Only a single VSA card is supported on the Cisco 7200VXR series routers with the NPE-G2 processor.
Note Only Cisco 7200VXR series routers with the NPE-G2 processor are supported.
•The VSA module does not support Online Insertion and Removal (OIR). See the C7200 VSA (VPN Services Adapter) Installation and Configuration Guide for details.
•Per packet count details for crypto map access list are not displayed when the show access-list command is entered.
•An anti-replay window size of 1024 is not supported.
•Crypto Tunnel Endpoint Discovery (TED) is unsupported with VSA.
•LLQ before crypto is not supported.
•Prefragmentation on bundled SA (transform set has both AH and ESP) is not supported.
Basic IPSec Configuration Example
The following is an example of an IPSec configuration in which the security associations are established through IKE. In this example, an access list is used to restrict the packets that are encrypted and decrypted. In this example, all packets going from IP address 10.0.0.2 to IP address 10.2.2.2 are encrypted and decrypted and all packets going from IP address 10.2.2.2 to IP address 10.0.0.2 are encrypted and decrypted. Also, one IKE policy is created.
Figure 1 Basic IPSec Configuration
Router A Configuration
Specify the parameters to be used during an IKE negotiation:
crypto isakmp policy 15encryption deshash md5authentication pre-sharegroup 2lifetime 5000crypto isakmp key 1234567890 address 10.2.2.3crypto isakmp identity address
Note In the preceding example, the encryption DES of policy 15 would not appear in the written configuration because this is the default value for the encryption algorithm parameter.
A transform set defines how the traffic will be protected:
crypto ipsec transform-set auth1 ah-md5-hmac esp-des esp-md5-hmacmode tunnel
Note In the preceding example, the mode tunnel would not appear in the written configuration because this is the default value for the transform-set.
A crypto map joins the transform set and specifies where the protected traffic is sent (the remote IPSec peer):
crypto map toRemoteSite 10 ipsec-isakmpset peer 10.2.2.3set transform-set auth1match address 101The crypto map is applied to an interface:
interface Serial0ip address 10.0.0.3crypto map toRemoteSiteAn IPSec access list defines which traffic to protect:
access-list 101 permit ip host 10.0.0.2 host 10.2.2.2access-list 101 permit ip host 10.0.0.3 host 10.2.2.3Router B Configuration
Specify the parameters to be used during an IKE negotiation:
crypto isakmp policy 15encryption deshash md5authentication pre-sharegroup 2lifetime 5000crypto isakmp key 1234567890 address 10.0.0.3crypto isakmp identity addressA transform set defines how the traffic will be protected:
crypto ipsec transform-set auth1 ah-md5-hmac esp-des ah-md5-hmacmode tunnelA crypto map joins the transform set and specifies where the protected traffic is sent (the remote IPSec peer):
crypto map toRemoteSite 10 ipsec-isakmpset peer 10.0.0.3set transform-set auth1match address 101The crypto map is applied to an interface:
interface Serial0ip address 10.2.2.3crypto map toRemoteSiteAn IPSec access list defines which traffic to protect:
access-list 101 permit ip host 10.2.2.2 host 10.0.0.2access-list 101 permit ip host 10.2.2.3 host 10.0.0.3Related Features and Technologies
The following features and technologies are related to the VSA:
•Internet Key Exchange (IKE)
•IP Security (IPSec)
Related Documents
•The following document describes the VSA hardware:
C7200 VSA (VPN Services Adapter) Installation and Configuration Guide
Supported Platforms
The VSA feature runs on the following platform:
•Cisco 7204VXR and Cisco 7206VXR routers with the NPE-G2 processor
Finding Support Information for Platforms and Cisco IOS Software Images
Use Cisco Feature Navigator to find information about platform support and Cisco IOS software image support. Access Cisco Feature Navigator at http://www.cisco.com/go/fn. You must have an account on Cisco.com. If you do not have an account or have forgotten your username or password, click Cancel at the login dialog box and follow the instructions that appear.
Supported Standards, MIBs, and RFCs
Standards
•No new or modified standards are supported by this feature.
MIBs
The following MIBs were introduced or modified in this feature:
•CISCO-IPSEC-FLOW-MONITOR-MIB
•CISCO-IPSEC-MIB
•CISCO-IPSEC-POLICY-MAP-MIB
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:
http://tools.cisco.com/ITDIT/MIBS/servlet/index
If Cisco MIB Locator does not support the MIB information that you need, you can also obtain a list of supported MIBs and download MIBs from the Cisco MIBs page at the following URL:
http://www.cisco.com/public/sw-center/netmgmt/cmtk/mibs.shtml
To access Cisco MIB Locator, you must have an account on Cisco.com. If you have forgotten or lost your account information, send a blank e-mail to cco-locksmith@cisco.com. An automatic check will verify that your e-mail address is registered with Cisco.com. If the check is successful, account details with a new random password will be e-mailed to you. Qualified users can establish an account on Cisco.com by following the directions found at the following URL:
RFCs
•IPSec/IKE: RFCs 2401-2411, 2451
Prerequisites
You must configure IPSec and IKE on the router and a crypto map to all interfaces that require encryption service from the VSA. See the "Configuration Examples" section for configuration procedures.
Configuration Tasks
On power up if the enabled LED is on, the VSA is fully functional and does not require any configuration commands. However, for the VSA to provide encryption services, you must complete the steps in the following sections:
•Using the EXEC Command Interpreter
Optionally, you can configure certification authority (CA) interoperability (refer to the "Configuring Certification Authority Interoperability" chapter in the Security Configuration Guide).
Using the EXEC Command Interpreter
You modify the configuration of your router through the software command interpreter called the EXEC (also called enable mode). You must enter the privileged level of the EXEC command interpreter with the enable command before you can use the configure command to configure a new interface or change the existing configuration of an interface. The system prompts you for a password if one has been set.
The system prompt for the privileged level ends with a pound sign (#) instead of an angle bracket (>). At the console terminal, use the following procedure to enter the privileged level:
Step 1 At the user-level EXEC prompt, enter the enable command. The EXEC prompts you for a privileged-level password as follows:
Router> enable
Password:Step 2 Enter the password (the password is case sensitive). For security purposes, the password is not displayed.
When you enter the correct password, the system displays the privileged-level system prompt (#):Router#
This completes the procedure for entering the privileged level of the EXEC command interpreter.
Configuring an IKE Policy
If you do not specify a value for a parameter, the default value is assigned. For information on default values, refer to the "IP Security and Encryption" chapter of the Security Command Reference publication.
To configure an IKE policy, use the following commands, beginning in global configuration mode:
For detailed information on creating IKE policies, refer to the "Configuring Internet Key Exchange Security Protocol" chapter in the Security Configuration Guide publication.
Verifying IKE Configurations
To view information about your IKE configurations, enter show crypto isakmp policy EXEC command. The following is sample output, including a warning message after a user tries to configure an IKE encryption method that the hardware does not support:
Router# show crypto isakmp policy
Protection suite of priority 1encryption algorithm: AES - Advanced Encryption Standard (256 bit keys).WARNING:encryption hardware does not support the configuredencryption method for ISAKMP policy 1hash algorithm: Secure Hash Standardauthentication method: Pre-Shared KeyDiffie-Hellman group: #1 (768 bit)lifetime: 3600 seconds, no volume limit
Enabling/Disabling the VSA (Optional)
This section includes the following topics:
•Disabling the VSA during Operation
The VSA crypto card does not support OIR. The VSA boots up only during system initialization. The VSA will not work if it is inserted after the system is up and running. The VSA can be shut down by a disabling CLI command. The VSA is ready for removal after the disabling CLI command is executed.
Disabling the VSA during Operation
Before removing the VSA, we recommend that you shut down the interface so that there is no traffic running through the VSA when it is removed. Removing the VSA while traffic is flowing through the ports can cause system disruption.
Caution You could damage the VSA, if you remove the VSA without entering the CLI command.
To disable the VSA, use the following commands, starting in global configuration mode:
Command PurposeStep 7
no crypto engine accelerator 0
Disables the VSA.
Step 8
crypto engine accelerator 0
VSA will be enabled after the next system reboot.
Note See Table 3 for more details.
Enabling/Disabling Scheme
This section describes how the VSA operates without OIR support.
Table 1 describes what occurs when the system boots up after power-on or after the reload command is entered.
Table 2 describes what occurs when the system is in run-time operation.
Table 3 describes what occurs when the crypto engine command is entered.
Table 2 System is in Run-time Operation
Condition System is ConfiguredInserting the VSA
The VSA should never be inserted in run-time operation. The system should always be powered off before you insert the VSA. You need to power on the system to bring the VSA up.
CLI Enabling VSA
Not supported.
CLI Disabling VSA
Hw-module slot 0 shutdown—Not supported.
[no] crypto engine [slot | accelerator] 0—See Table 3
Removing VSA
You must enter a disabling CLI (see Table 3) before removing the card to avoid damaging the hardware.
Configuring a Transform Set
See the AES feature module for more information on configuring a transform set.
This section includes the following topics:
•Defining a Transform Set (required)
•IPSec Protocols: AH and ESP (optional)
•Selecting Appropriate Transforms (optional)
•The Crypto Transform Configuration Mode (optional)
•Changing Existing Transforms (optional)
•Transform Example (optional)
A transform set is an acceptable combination of security protocols, algorithms, and other settings to apply to IPSec protected traffic. During the IPSec security association (SA) negotiation, the peers agree to use a particular transform set when protecting a particular data flow.
Defining a Transform Set
A transform set is a combination of security protocols and algorithms. During the IPSec security association negotiation, peers agree to use a specific transform set to protect a particular data flow.
To define a transform set, use the following commands, starting in global configuration mode:
Note The clear commands in Step 4 below are in EXEC or enable mode (see "Using the EXEC Command Interpreter" section for more details).
Command PurposeStep 1
Router(config)# crypto ipsec transform-set transform-set-name transform1 [transform2 [transform3]]
Defines a transform set and enters crypto transform configuration mode.
•transform-set-name—Specifies the name of the transform set to create (or modify).
•transform1 [transform2 [transform3] [transform4]]—Defines the IPSec security protocols and algorithms. Accepted transform values are described in Table 4.
Step 2
Router(cfg-crypto-tran)# mode [tunnel | transport]
(Optional) Changes the mode associated with the transform set. The mode setting is only applicable to traffic whose source and destination addresses are the IPSec peer addresses; it is ignored for all other traffic. (All other traffic is in tunnel mode only.)
Step 3
end
Exits the crypto transform configuration mode to enabled mode.
Step 4
Router# clear crypto sa
or
Router# clear crypto sa peer {ip-address | peer-name}
or
Router# clear crypto sa map map-name
or
Router# clear crypto sa spi destination-address protocol spiClears existing IPSec security associations so that any changes to a transform set take effect on subsequently established security associations (SAs). (Manually established SAs are reestablished immediately.)
Entering the clear crypto sa command without parameters clears out the full SA database, which clears out active security sessions. You may also specify the peer, map, or entry keywords to clear out only a subset of the SA database.
Table 4 shows allowed transform combinations for the AH and ESP protocols.
Examples of acceptable transform combinations are as follows:
•ah-md5-hmac
•esp-des
•esp-3des and esp-md5-hmac
•ah-sha-hmac and esp-des and esp-sha-hmac
The parser will prevent you from entering invalid combinations; for example, once you specify an AH transform it will not allow you to specify another AH transform for the current transform set.
IPSec Protocols: AH and ESP
Both the AH and ESP protocols implement security services for IPSec.
AH provides data authentication and antireplay services.
ESP provides packet encryption and optional data authentication and antireplay services.
ESP encapsulates the protected data—either a full IP datagram (or only the payload)—with an ESP header and an ESP trailer. AH is embedded in the protected data; it inserts an AH header immediately after the outer IP header and before the inner IP datagram or payload. Traffic that originates and terminates at the IPSec peers can be sent in either tunnel or transport mode; all other traffic is sent in tunnel mode. Tunnel mode encapsulates and protects a full IP datagram, while transport mode encapsulates/protects the payload of an IP datagram. For more information about modes, refer to the mode (IPSec) command description.
Selecting Appropriate Transforms
The following tips may help you select transforms that are appropriate for your situation:
•If you want to provide data confidentiality, include an ESP encryption transform.
•If you want to ensure data authentication for the outer IP header as well as the data, include an AH transform. (Some consider the benefits of outer IP header data integrity to be debatable.)
•If you use an ESP encryption transform, also consider including an ESP authentication transform or an AH transform to provide authentication services for the transform set.
•If you want data authentication (either using ESP or AH) you can choose from the MD5 or SHA (HMAC keyed hash variants) authentication algorithms. The SHA algorithm is generally considered stronger than MD5 but is slightly slower.
•Note that some transforms might not be supported by the IPSec peer.
Note If a user enters an IPSec transform that the hardware (the IPSec peer) does not support, a warning message will be displayed immediately after the crypto ipsec transform-set command is entered.
•In cases where you need to specify an encryption transform but do not actually encrypt packets, you can use the esp-null transform.
Suggested transform combinations follow:
•esp-aes and esp-sha-hmac
•ah-sha-hmac and esp-aes and esp-sha-hmac
The Crypto Transform Configuration Mode
After you issue the crypto ipsec transform-set command, you are put into the crypto transform configuration mode. While in this mode, you can change the mode to tunnel or transport. (These are optional changes.) After you have made these changes, type exit to return to global configuration mode. For more information about these optional changes, refer to the match address (IPSec) and mode (IPSec) command descriptions.
Changing Existing Transforms
If one or more transforms are specified in the crypto ipsec transform-set command for an existing transform set, the specified transforms will replace the existing transforms for that transform set.
If you change a transform set definition, the change is only applied to crypto map entries that reference the transform set. The change will not be applied to existing SAs, but will be used in subsequent negotiations to establish new SAs. If you want the new settings to take effect sooner, you can clear all or part of the SA database by using the clear crypto sa command.
Transform Example
The following example defines two transform sets. The transform set will be used with an IPSec peer that supports the newer ESP and AH protocols.
crypto ipsec transform-set newer esp-3des esp-sha-hmacConfiguring IPSec
This section includes the following topics:
•Ensuring That Access Lists Are Compatible with IPSec (required)
•Setting Global Lifetimes for IPSec Security Associations (required)
•Creating Crypto Access Lists (required)
•Creating Crypto Map Entries (required)
•Creating Dynamic Crypto Maps (required)
•Applying Crypto Map Sets to Interfaces (required)
•Verifying IPSec Configurations (optional)
For IPSec configuration examples, refer to the "Configuring IPSec Example" section.
See the "Configuring IPSec Network Security" chapter of the Cisco IOS Security Configuration Guide publication for more information on configuring IPSec.
Ensuring That Access Lists Are Compatible with IPSec
IKE uses UDP port 500. The IPSec Encapsulating Security Payload (ESP) and Authentication Header (AH) protocols use protocol numbers 50 and 51. Ensure that your interface access lists are configured so that protocol numbers 50, 51, and UDP port 500 traffic are not blocked at interfaces used by IPSec. In some cases, you might need to add a statement to your access lists to explicitly permit this traffic.
Setting Global Lifetimes for IPSec Security Associations
You can change the global lifetime values which are used when negotiating new IPSec security associations. (These global lifetime values can be overridden for a particular crypto map entry).
These lifetimes only apply to security associations established via IKE. Manually established security associations do not expire.
To change a global lifetime for IPSec security associations, use one or more of the following commands in global configuration mode:
Note The clear commands in Step 3 below are in EXEC or enable mode (see "Using the EXEC Command Interpreter" section for more details).
Creating Crypto Access Lists
Crypto access lists define which IP traffic will be protected by encryption. (These access lists are not the same as regular access lists, which determine what traffic to forward or block at an interface.) For example, access lists can be created to protect all IP traffic between Subnet A and Subnet Y or Telnet traffic between Host A and Host B.
To create crypto access lists, use the following command in global configuration mode:
Step Command PurposeStep 1
Router(config)# access-list access-list-number {deny | permit} protocol source source-wildcard destination destination-wildcard [log]
or
Router(config)# ip access-list extended name
Specifies conditions to determine which IP packets will be protected.1 (Enable or disable crypto for traffic that matches these conditions.)
We recommend that you configure "mirror image" crypto access lists for use by IPSec and that you avoid using the any keyword.
Step 2
Add permit and deny statements as appropriate.
Adds permit or deny statements to access lists.
Step 3
End
Exits the configuration command mode.
1 You specify conditions using an IP access list designated by either a number or a name. The access-list command designates a numbered extended access list; the ip access-list extended command designates a named access list.
For detailed information on configuring access lists, refer to the "Configuring IPSec Network Security" chapter in the Cisco IOS Security Configuration Guide publication.
Creating Crypto Map Entries
You can apply only one crypto map set to a single interface. The crypto map set can include a combination of IPSec/IKE and IPSec/manual entries. Multiple interfaces can share the same crypto map set if you want to apply the same policy to multiple interfaces.
To create crypto map entries that use IKE to establish the security associations, use the following commands, starting in global configuration mode:
To create crypto map entries that will use IKE to establish the security associations, use the following commands, starting in global configuration mode:
Creating Dynamic Crypto Maps
A dynamic crypto map entry is a crypto map entry with some parameters not configured.The missing parameters are later dynamically configured (as the result of an IPSec negotiation). Dynamic crypto maps are only available for use by IKE.
Dynamic crypto map entries are grouped into sets. A set is a group of dynamic crypto map entries all with the same dynamic-map-name, each with a different dynamic-seq-num.
To create a dynamic crypto map entry, use the following commands, starting in global configuration mode:
To add a dynamic crypto map set into a crypto map set, use the following command in global configuration mode:
Command PurposeRouter(config)# crypto map map-name seq-num ipsec-isakmp dynamic dynamic-map-name
Adds a dynamic crypto map set to a static crypto map set.
Applying Crypto Map Sets to Interfaces
Apply a crypto map set to each interface through which IPSec traffic will flow. Crypto maps instruct the router to evaluate the interface traffic against the crypto map set and use the specified policy during connection or security association negotiation on behalf of traffic to be protected by crypto.
To apply a crypto map set to an interface, use the following command in interface configuration mode:
To specify redundant interfaces and name an identifying interface, use the following command in global configuration mode:
Command PurposeRouter(config)# crypto map map-name local-address interface-id
Permits redundant interfaces to share the same crypto map, using the same local identity.
Verifying IPSec Configurations
Some configuration changes take effect only after subsequent security associations are negotiated. For the new settings to take effect immediately, clear the existing security associations.
To clear (and reinitialize) IPSec security associations, use one of the commands in Table 5 in EXEC mode:
The following steps provide information on verifying your configurations:
Step 1 To view your transform set configuration, enter the show crypto ipsec transform-set command.
The following is sample output:
Router# show crypto ipsec transform-set
Transform set combined-des-md5: {esp-des esp-md5-hmac}will negotiate = {Tunnel,},Transform set t1: {esp-des esp-md5-hmac}will negotiate = {Tunnel,},Transform set t100: {ah-sha-hmac}will negotiate = {Transport,},Transform set t2: {ah-sha-hmac}will negotiate = {Tunnel,},{esp-des}will negotiate = {Tunnel,},
Note If a user enters an IPSec transform that the hardware (the IPSec peer) does not support, a warning message will be displayed in the show crypto ipsec transform-set output.
The following is sample output from the show crypto ipsec transform-set command, which displays a warning message after a user tries to configure an IPSec transform that the hardware does not support:
Router# show crypto ipsec transform-set
Transform set transform-1:{esp-256-aes esp-md5-hmac}will negotiate = {Tunnel, },WARNING:encryption hardware does not support transformesp-aes 256 within IPSec transform transform-1
Step 2 Enter the show crypto map [interface interface | tag map-name] command to view your crypto map configuration:
Router# show crypto map
Crypto Map: "router-alice" idb: Ethernet0 local address: 172.21.114.123Crypto Map "router-alice" 10 ipsec-isakmpPeer = 172.21.114.67Extended IP access list 141access-list 141 permit ipsource: addr = 172.21.114.123/0.0.0.0dest: addr = 172.21.114.67/0.0.0.0Current peer: 172.21.114.67Security-association lifetime: 4608000 kilobytes/120 secondsPFS (Y/N): NTransform sets={t1,}Step 3 To view information about IPSec security associations, enter the show crypto ipsec sa [map map-name | address | identity | detail | interface] command :
Router# show crypto ipsec sa
interface: Ethernet0Crypto map tag: router-alice, local addr. 172.21.114.123local ident (addr/mask/prot/port): (172.21.114.123/255.255.255.255/0/0)remote ident (addr/mask/prot/port): (172.21.114.67/255.255.255.255/0/0)current_peer: 172.21.114.67PERMIT, flags={origin_is_acl,}#pkts encaps: 10, #pkts encrypt: 10, #pkts digest 10#pkts decaps: 10, #pkts decrypt: 10, #pkts verify 10#send errors 10, #recv errors 0local crypto endpt.: 172.21.114.123, remote crypto endpt.: 172.21.114.67path mtu 1500, media mtu 1500current outbound spi: 20890A6Finbound esp sas:spi: 0x257A1039(628756537)transform: esp-des esp-md5-hmac,in use settings ={Tunnel,}slot: 0, conn id: 26, crypto map: router-alicesa timing: remaining key lifetime (k/sec): (4607999/90)IV size: 8 bytesreplay detection support: Yinbound ah sas:outbound esp sas:spi: 0x20890A6F(545852015)transform: esp-des esp-md5-hmac,in use settings ={Tunnel,}slot: 0, conn id: 27, crypto map: router-alicesa timing: remaining key lifetime (k/sec): (4607999/90)IV size: 8 bytesreplay detection support: Youtbound ah sas:interface: Tunnel0Crypto map tag: router-alice, local addr. 172.21.114.123local ident (addr/mask/prot/port): (172.21.114.123/255.255.255.255/0/0)remote ident (addr/mask/prot/port): (172.21.114.67/255.255.255.255/0/0)current_peer: 172.21.114.67PERMIT, flags={origin_is_acl,}#pkts encaps: 10, #pkts encrypt: 10, #pkts digest 10#pkts decaps: 10, #pkts decrypt: 10, #pkts verify 10#send errors 10, #recv errors 0local crypto endpt.: 172.21.114.123, remote crypto endpt.: 172.21.114.67path mtu 1500, media mtu 1500current outbound spi: 20890A6Finbound esp sas:spi: 0x257A1039(628756537)transform: esp-des esp-md5-hmac,in use settings ={Tunnel,}slot: 0, conn id: 26, crypto map: router-alicesa timing: remaining key lifetime (k/sec): (4607999/90)IV size: 8 bytesreplay detection support: Yinbound ah sas:outbound esp sas:spi: 0x20890A6F(545852015)transform: esp-des esp-md5-hmac,in use settings ={Tunnel,}slot: 0, conn id: 27, crypto map: router-alicesa timing: remaining key lifetime (k/sec): (4607999/90)IV size: 8 bytesreplay detection support: Youtbound ah sas:
For a detailed description of the information displayed by the show commands, refer to the "IP Security and Encryption" chapter of the Security Command Reference publication.
Troubleshooting Tips
To verify that Cisco IOS software has recognized the VSA, enter the show diag command. The following is sample output when the router has the VSA in slot 0:
Router# show diag 0
Slot 0:VSA IPsec Card Port adapterPort adapter is analyzedPort adapter insertion time 00:23:25 agoEEPROM contents at hardware discovery:PCB Serial Number : PRTA4404055Product (FRU) Number : C7200-VSAEEPROM format version 4EEPROM contents (hex):0x00: 04 FF C1 8B 50 52 54 41 34 34 30 34 30 35 35 400x10: 05 0D CB 94 43 37 32 30 30 2D 56 53 41 20 20 200x20: 20 20 20 20 20 20 20 20 D9 03 C1 40 CB FF FF FF0x30: FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF0x40: FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF0x50: FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF0x60: FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF0x70: FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FFTo see if the VSA is currently processing crypto packets, enter the show crypto engine accelerator statistic 0 command. The following is sample output:
Router# show crypto engine accelerator statistic 0
Device: VSALocation: Service Adapter: 0VSA Traffic StatisticsInbound rate: 0pps 0kb/s Outbound rate: 0pps 0kb/sTXR0 PKT: 0x00000000000028B2 Byte: 0x000000000006ACF6 Full: 0x0000000000000000RXR0 PKT: 0x00000000000028B2 Byte: 0x0000000000A86398TXR1 PKT: 0x0000000000000000 Byte: 0x0000000000000000 Full: 0x0000000000000000RXR1 PKT: 0x0000000000000000 Byte: 0x0000000000000000TXR2 PKT: 0x0000000000000000 Byte: 0x0000000000000000 Full: 0x0000000000000000RXR2 PKT: 0x0000000000000000 Byte: 0x0000000000000000Inbound Traffic:Decrypted PHY I/F:0x0000000000000000 TUNNEL I/F: 0x0000000000000000SPI Error PHY I/F:0x0000000000000000 TUNNEL I/F: 0x0000000000000000Pass clear PHY I/F:0x0000000000000000 TUNNEL I/F: 0x0000000000000000SPD Drop: 0x0000000000000000 IKE Bypass: 0x0000000000000000Outbound Traffic:Encry CEF: 0x0000000000000000 FS: 0x0000000000000000 PROC: 0x0000000000000000Pass CEF: 0x0000000000000000 FS: 0x0000000000000000 PROC: 0x0000000000000000ICMP Unreachable: 0x0000000000000000 ICMP Unreach Fail: 0x0000000000000000SPD Drop: 0x0000000000000000Special Traffic:VAM mode PKT: 0x0000000000000000 Exception: 0x0000000000000000N2 Message: : 0x00000000000028B2 Exception: 0x0000000000000000IP PKT Exception: 0x0000000000000000 DJ Overflow: 0x0000000000000000RAE Report PKT:: 0x0000000000000000 PKT Consumed: 0x0000000000000000TCAM WR: 0x0000000000000001 TCAM RD: 0x0000000000000000SARAM WR: 0x0000000000008422 SARAM RD: 0x0000000000000000RAE WR: 0x0000000000080000 RAE RD: 0x0000000000000000Warnings:N2 interrupt: 0x0000000000000000 Invalid Op: 0x0000000000000000RX CTX error: 0x0000000000000000 TX CTX low: 0x0000000000000000PKT CTX Low: 0x0000000000000000 PKT Info Low: 0x0000000000000000PKT Header Low: 0x0000000000000000 Particle Low: 0x0000000000000000Missing SOP: 0x0000000000000000 Missing EOP: 0x0000000000000000TX Drop IB: 0x0000000000000000 TX Drop OB: 0x0000000000000000MSG Unknown: 0x0000000000000000 MSG too Big: 0x0000000000000000MSG Empty: 0x0000000000000000 MSG No Buffer: 0x0000000000000000PKT Info Missing: 0x0000000000000000 IB SB Error: 0x0000000000000000TX Drop Fastsend: 0x0000000000000000 IDMA Full: 0x0000000000000000Particle Fallback: 0x0000000000000000 STATISTIC: 0x0000000000000000Elrond statistic:TXDMA PKT Count: 0x00000000000028B2 Byte Count: 0x000000000006ACF6RXDMA PKT Count: 0x00000000000028B2 Byte Count: 0x0000000000A86398IPPE PKT Count: 0x00000000000028B2 EPPE PKT Count:0x00000000000028B2PL3TX PKT Count: 0x00000000000028B2 Byte Count: 0x000000000009DADEPL3RX PKT Count: 0x00000000000028B2 Byte Count: 0x0000000000A86398CAM search IPPE: 0x0000000000000000 EPPE: 0x0000000000000000SARAM Req IPPE: 0x0000000000000000 EPPE: 0x0000000000000000RAE Frag Req IPPE: 0x0000000000000000 EPPE: 0x0000000000000000RAE ReAssembly: 0x0000000000000000 Re-Ordering: 0x0000000000000000REA Frag Finished: 0x0000000000000000Frag Drop Count:IPPE: 0x0000000000000000 EPPE: 0x0000000000000000FIFO: 0x0000000000000000 RAE: 0x0000000000000000VSA RX Exception statistics:IRH Not valid : 0 Invalid SA : 0SA configuration error : 0 Enc Dec mismatch : 0Insufficient Push : 0 Next Header mismatch : 0Pad mismatch : 0 MAC mismatch : 0Atomic OP failed : 0 L2 UDD GE 256 : 0Max BMI Read too small : 0 Max BMI Read No payload : 0Anti replay failed : 0 Enc Seq num overflow : 0Dec IPver mismatch : 0 Enc IPver mismatch : 0TTL Decr : 0 Selector checks : 0UDP mismatch : 0 Reserved : 0Soft byte lifetime : 0 hardbyte lifetime : 0IP Parse error : 0 Fragmentation Error : 0Unknown Exception : 0When the VSA processes packets, the "packets in" and "packets out" counter changes. Counter "packets out" represents the number of packets directed to the VSA. Counter "packets in" represents the number of packets received from the VSA.
To see if the IKE/IPSec packets are being redirected to the VSA for IKE negotiation and IPSec encryption and decryption, enter the show crypto eli command. The following is sample output when Cisco IOS software redirects packets to VSA:
Router# show crypto eli
Hardware Encryption : ACTIVENumber of hardware crypto engines = 1CryptoEngine VSA details: state = ActiveCapability : DES, 3DES, AES, RSAIKE-Session : 0 active, 5120 max, 0 failedDH : 0 active, 5120 max, 0 failedIPSec-Session : 0 active, 10230 max, 0 failedWhen the software crypto engine is active, the show crypto eli command yields no output.
When the Cisco IOS software agrees to redirect crypto traffic to the VSA, it prints a message similar to the following:
%ISA-6-INFO:Recognised crypto engine (0) at slot-0...switching to hardware crypto engineTo disable the VSA, use the configuration mode no crypto engine accelerator <slot> command, as follows:
Router(config)# no crypto engine accelerator 0
...switching to SW crypto engineRouter(config)#*Feb 6 11:57:26.763: %VPN_HW-6-INFO_LOC: Crypto engine: slot 0 State changed to: Disabled*Feb 6 11:57:26.779: %PA-3-DEACTIVATED: port adapter in bay [0] powered off.*Feb 6 11:57:26.779: %CRYPTO-6-ISAKMP_ON_OFF: ISAKMP is OFFRouter(config)#endMonitoring and Maintaining
Use the commands that follow to monitor and maintain the VSA:
To clear (and reinitialize) IPSec security associations, use one of the following commands in EXEC mode:
To view information about your IPSec configuration, use one or more of the following commands in EXEC mode:
Configuration Examples
This section provides the following configuration examples:
•Configuring IKE Policies Example
Configuring IKE Policies Example
In the following example, two IKE policies are created, with policy 15 as the highest priority, policy 20 as the next priority, and the existing default priority as the lowest priority. It also creates a preshared key to be used with policy 20 with the remote peer whose IP address is 192.168.224.33.
crypto isakmp policy 15encryption 3deshash md5authentication rsa-siggroup 2lifetime 5000crypto isakmp policy 20authentication pre-sharelifetime 10000crypto isakmp key 1234567890 address 192.168.224.33Configuring IPSec Example
The following example shows a minimal IPSec configuration where the security associations will be established via IKE:
An IPSec access list defines which traffic to protect:
access-list 101 permit ip 10.0.0.0 0.0.0.255 10.2.2.0 0.0.0.255A transform set defines how the traffic will be protected. In this example, transform set "myset1" uses DES encryption and SHA for data packet authentication:
crypto ipsec transform-set myset1 esp-des esp-shaAnother transform set example is "myset2," which uses Triple DES encryptions and MD5 (HMAC variant) for data packet authentication:
crypto ipsec transform-set myset2 esp-3des esp-md5-hmacA crypto map joins together the IPSec access list and transform set and specifies where the protected traffic is sent (the remote IPSec peer):
crypto map toRemoteSite 10 ipsec-isakmpmatch address 101set transform-set myset2set peer 10.2.2.5The crypto map is applied to an interface:
interface Serial0ip address 10.0.0.2crypto map toRemoteSite
Note In this example, IKE must be enabled.
Command Reference
This section documents new commands. There are no new commands associated with the VSA. All other commands used with this feature are documented in the Cisco IOS Release 12.3(12)M command reference publications.
Glossary
ACL—Access Control List
AH—Authentication Header
DPD—Dead Peer Detection
ESP—Encapsulating Security Payload
GRE—Generic Routing Encapsulation
HSRP—Hot Standby Routing Protocol
IKE—Internet Key Exchange. IKE establishes a shared security policy and authenticates keys for services (such as IPSec) that require keys. Before any IPSec traffic can be passed, each router/firewall/host must verify the identity of its peer. This can be done by manually entering preshared keys into both hosts or by a CA service.
IPSec—IP Security. A framework of open standards that provides data confidentiality, data integrity, and data authentication between participating peers. IPSec provides these security services at the IP layer. IPSec uses IKE to handle the negotiation of protocols and algorithms based on local policy and to generate the encryption and authentication keys to be used by IPSec. IPSec can protect one or more data flows between a pair of hosts, between a pair of security gateways, or between a security gateway and a host.
ISA—Integrated Services Adapter
ISAKMP—Internet Security Association Key Management Protocol
HA—High Availability
MM—IKE Main Mode
MODECFG—Mode Configuration
QM—IKE Quick Mode
SA—security association
VAM—VPN Acceleration Module
VSA—VPN Services Adapter
VPN—Virtual Private Network
XAUTH—Extended Authentication
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental.
© <year> Cisco Systems, Inc. All rights reserved.