27-7
Cisco Security Appliance Command Line Configuration Guide
OL-12172-03
Chapter 27 Configuring IPSec and ISAKMP
Configuring ISAKMP
The security appliance uses the Phase I ID to send to the peer. This is true for all VPN scenarios except
LAN-to-LAN connections in main mode that authenticate with preshared keys.
The default setting is hostname.
To change the peer identification method, enter the following command:
crypto isakmp identity {address
|
hostname
|
key-id
id-string
|
auto}
For example, the following command sets the peer identification method to automatic:
hostname(config)#
crypto isakmp identity auto
Enabling IPSec over NAT-T
NAT-T lets IPSec peers establish a connection through a NAT device. It does this by encapsulating IPSec
traffic in UDP datagrams, using port 4500, thereby providing NAT devices with port information. NAT-T
auto-detects any NAT devices, and only encapsulates IPSec traffic when necessary. This feature is
disabled by default.
With the exception of the home zone on the Cisco ASA 5505, the security appliance can simultaneously
support standard IPSec, IPSec over TCP, NAT-T, and IPSec over UDP, depending on the client with
which it is exchanging data. When both NAT-T and IPSec over UDP are enabled, NAT-T takes
precedence. IPSec over TCP, if enabled, takes precedence over all other connection methods.
When you enable NAT-T, the security appliance automatically opens port 4500 on all IPSec enabled
interfaces.
The security appliance supports multiple IPSec peers behind a single NAT/PAT device operating in one
of the following networks, but not both:
•
LAN-to-LAN
•
Remote access
In a mixed environment, the remote access tunnels fail the negotiation because all peers appear to be
coming from the same public IP address, that of the NAT device. Also, remote access tunnels fail in a
mixed environment because they often use the same name as the LAN-to-LAN tunnel group (that is, the
IP address of the NAT device). This match can cause negotiation failures among multiple peers in a
mixed LAN-to-LAN and remote access network of peers behind the NAT device.
Using NAT-T
To use NAT-T, you must perform the following tasks:
Step 1
Enter the following command to enable IPSec over NAT-T globally on the security appliance.
Address
Uses the IP addresses of the hosts exchanging ISAKMP identity information.
Automatic
Determines ISAKMP negotiation by connection type:
•
IP address for preshared key.
•
Cert Distinguished Name for certificate authentication.
Hostname
Uses the fully qualified domain name of the hosts exchanging ISAKMP identity
information (default). This name comprises the hostname and the domain name.
Key ID
Uses the string the remote peer uses to look up the preshared key.
Summary of Contents for 500 Series
Page 38: ...Contents xxxviii Cisco Security Appliance Command Line Configuration Guide OL 12172 03 ...
Page 45: ...P A R T 1 Getting Started and General Information ...
Page 46: ......
Page 277: ...P A R T 2 Configuring the Firewall ...
Page 278: ......
Page 561: ...P A R T 3 Configuring VPN ...
Page 562: ......
Page 891: ...P A R T 4 System Administration ...
Page 892: ......
Page 975: ...P A R T 5 Reference ...
Page 976: ......