1-32
Cisco ASA Series CLI Configuration Guide
Chapter 1 Configuring IPsec and ISAKMP
Configuring IPsec
The peers negotiate a new SA before crossing the lifetime threshold of the existing SA to ensure that a
new SA is ready when the existing one expires. The peers negotiate a new SA when about 5 to 15 percent
of the lifetime of the existing SA remains.
Creating a Basic IPsec Configuration
You can create basic IPsec configurations with static or dynamic crypto maps.
To create a basic IPsec configuration using a static crypto map, perform the following steps:
Step 1
To create an access list to define the traffic to protect, enter the following command:
access-list
access-list-name
{deny | permit} ip
source source-netmask destination
destination-netmask
For example:
hostname(config)#
access-list 101 permit ip 10.0.0.0 255.255.255.0 10.1.1.0 255.255.255.0
The
access-list-name
specifies the access list ID, as a string or integer up to 241 characters in length.
The
destination-netmask
and
source-netmask
specifies an IPv4 network address and subnet mask. In this
example, the
permit
keyword causes all traffic that matches the specified conditions to be protected by
crypto.
Step 2
To configure an IKEv1 transform set that defines how to protect the traffic, enter the following
command:
crypto ipsec ikev1 transform-set
transform-set-name
encryption
[
authentication
]
Encryption
specifies which encryption method protects IPsec data flows:
•
esp-aes—Uses AES with a 128-bit key.
•
esp-aes-192—Uses AES with a 192-bit key.
•
esp-aes-256—Uses AES with a 256-bit key.\
•
esp-des—Uses 56-bit DES-CBC.
•
esp-3des—Uses triple DES algorithm.
•
esp-null—No encryption.
Authentication
specifies which encryption method to protect IPsec data flows:
•
esp-md5-hmac—Uses the MD5/HMAC-128 as the hash algorithm.
•
esp-sha-hmac—Uses the SHA/HMAC-160 as the hash algorithm.
•
esp-none—No HMAC authentication.
For example:
hostname(config)#
crypto ipsec ikev1 transform-set myset1 esp-des esp-sha-hmac
hostname(config)#
crypto ipsec ikev1 transform-set myset2 esp-3des esp-sha-hmac
hostname(config)#
crypto ipsec ikev1 transform-set aes_set esp-md5-hmac esp-aes-256
In this example, myset1 and myset2 and aes_set are the names of the transform sets.
To configure an IKEv2 proposal that also defines how to protect the traffic, enter the
crypto ipsec ikev2
ipsec-proposal
command to create the proposal and enter the ipsec proposal configuration mode where
you can specify multiple encryption and integrity types for the proposal:
crypto ipsec ikev2 ipsec-proposal
[
proposal tag
]
Summary of Contents for 5505 - ASA Firewall Edition Bundle
Page 28: ...Glossary GL 24 Cisco ASA Series CLI Configuration Guide ...
Page 61: ...P A R T 1 Getting Started with the ASA ...
Page 62: ......
Page 219: ...P A R T 2 Configuring High Availability and Scalability ...
Page 220: ......
Page 403: ...P A R T 2 Configuring Interfaces ...
Page 404: ......
Page 499: ...P A R T 2 Configuring Basic Settings ...
Page 500: ......
Page 533: ...P A R T 2 Configuring Objects and Access Lists ...
Page 534: ......
Page 601: ...P A R T 2 Configuring IP Routing ...
Page 602: ......
Page 745: ...P A R T 2 Configuring Network Address Translation ...
Page 746: ......
Page 845: ...P A R T 2 Configuring AAA Servers and the Local Database ...
Page 846: ......
Page 981: ...P A R T 2 Configuring Access Control ...
Page 982: ......
Page 1061: ...P A R T 2 Configuring Service Policies Using the Modular Policy Framework ...
Page 1062: ......
Page 1093: ...P A R T 2 Configuring Application Inspection ...
Page 1094: ......
Page 1191: ...P A R T 2 Configuring Unified Communications ...
Page 1192: ......
Page 1333: ...P A R T 2 Configuring Connection Settings and QoS ...
Page 1334: ......
Page 1379: ...P A R T 2 Configuring Advanced Network Protection ...
Page 1380: ......
Page 1475: ...P A R T 2 Configuring Modules ...
Page 1476: ......
Page 1549: ...P A R T 2 Configuring VPN ...
Page 1550: ......
Page 1965: ...P A R T 2 Configuring Logging SNMP and Smart Call Home ...
Page 1966: ......
Page 2059: ...P A R T 2 System Administration ...
Page 2060: ......
Page 2098: ...1 8 Cisco ASA Series CLI Configuration Guide Chapter 1 Troubleshooting Viewing the Coredump ...
Page 2099: ...P A R T 2 Reference ...
Page 2100: ......