Cisco ASA Site-to-Site IKEv1 IPsec VPN (2024)

Lesson Contents

Site-to-site IPsec VPNs are used to “bridge” two distant LANs together over the Internet. Normally on the LAN we use private addresses so without tunneling, the two LANs would be unable to communicate with each other.

In this lesson you will learn how to configure IKEv1 IPsec between two Cisco ASA firewalls to bridge two LANs together.

Configuration

We will use the following topology for this example:

Cisco ASA Site-to-Site IKEv1 IPsec VPN (1)

ASA1 and ASA2 are connected with each other using their Ethernet 0/1 interfaces. This is the “OUTSIDE” security zone so imagine that this is their Internet connection. Each ASA has an Ethernet 0/0 interface which is connected to the “INSIDE” security zone. R1 is in network 192.168.1.0 /24 while R2 is in 192.168.2.0 /24. The goal is to ensure that R1 and R2 can communicate with each other through the IPsec tunnel.

Phase 1 Configuration

Phase 1 of IPsec is used to establish a secure channel between the two peers that will be used for further data transmission. The ASAs will exchange secret keys, they authenticate each other and will negotiate about the IKE security policies. This is what happens in phase 1:

  • Authenticate and protect the identities of the IPsec peers.
  • Negotiate a matching IKE policy between IPsec peers to protect the IKE exchange.
  • Perform an authenticated Diffie-Hellman exchange to have matching shared secret keys.
  • Setup a secure tunnel for IKE phase 2.

Here’s what the configuration looks like on ASA1:

ASA1(config)# crypto ikev1 policy 10 ASA1(config-ikev1-policy)# authentication pre-share ASA1(config-ikev1-policy)# encryption aesASA1(config-ikev1-policy)# hash shaASA1(config-ikev1-policy)# group 2ASA1(config-ikev1-policy)# lifetime 3600

Let me break down this configuration for you:

  • The IKEv1 policy starts with a priority number, I picked number 10. The lower the number, the higher the priority…you can use this if you have multiple peers.
  • We use a pre-shared key for authentication.
  • Encryption is done with AES.
  • SHA is used for hashing.
  • We use Diffie-Hellman group 2 for secret key exchange.
  • The security association is 3600 seconds, once this expires we will do a renegotiation.

If you use any ASA version before ASA 8.4 then the keyword “ikev1” has to be replaced with “isakmp”.

The IKEv1 policy is configured but we still have to enable it:

ASA1(config)# crypto ikev1 enable OUTSIDEASA1(config)# crypto isakmp identity address 

The first command enables our IKEv1 policy on the OUTSIDE interface and the second command is used so the ASA identifies itself with its IP address, not its FQDN (Fully Qualified Domain Name).

We configured the IKEv1 policy and activated it on the interface but we still have to specify the remote peer and a pre-shared key. This is done with a tunnel-group:

ASA1(config)# tunnel-group 10.10.10.2 type ipsec-l2l

The IP address above is the IP address of the OUTSIDE interface on ASA2. The type “ipsec-l2l” means lan-to-lan. Let’s configure the pre-shared key now:

ASA1(config)# tunnel-group 10.10.10.2 ipsec-attributes ASA1(config-tunnel-ipsec)# ikev1 pre-shared-key MY_SHARED_KEY

The pre-shared key is configured as an attribute for the remote peer. I’ll use “MY_SHARED_KEY” as the pre-shared key between the two ASA firewalls. This takes care of the phase 1 configuration on ASA1, we’ll configure the same thing on ASA2:

ASA2(config)# crypto ikev1 policy 10ASA2(config-ikev1-policy)# authentication pre-share ASA2(config-ikev1-policy)# encryption aesASA2(config-ikev1-policy)# hash shaASA2(config-ikev1-policy)# group 2ASA2(config-ikev1-policy)# lifetime 3600
ASA2(config)# crypto ikev1 enable outsideASA2(config)# crypto isakmp identity address 
ASA2(config)# tunnel-group 10.10.10.1 type ipsec-l2l
ASA2(config)# tunnel-group 10.10.10.1 ipsec-attributes ASA2(config-tunnel-ipsec)# ikev1 pre-shared-key MY_SHARED_KEY

Phase 1 is now configured on both ASA firewalls. Let’s continue with phase 2…

Phase 2 configuration

Once the secure tunnel from phase 1 has been established, we will start phase 2. In this phase the two firewalls will negotiate about the IPsec security parameters that will be used to protect the traffic within the tunnel. In short, this is what happens in phase 2:

  • Negotiate IPsec security parameters through the secure tunnel from phase 1.
  • Establish IPsec security associations.
  • Periodically renegotiates IPsec security associations for security.

Here’s what the configuration looks like, we’ll start with ASA1:

ASA1(config)# access-list LAN1_LAN2 extended permit ip 192.168.1.0 255.255.255.0 192.168.2.0 255.255.255.0

First we configure an access-list that defines what traffic we are going to encrypt. This will be the traffic between 192.168.1.0 /24 and 192.168.2.0 /24.

The IPsec peers will negotiate about the encryption and authentication algorithms and this is done using a transform-set. Here’s what it looks like:

ASA1(config)# crypto ipsec ikev1 transform-set MY_TRANSFORM_SET esp-aes-256 esp-sha-hmac

The transform set is called “MY_TRANSFORM_SET” and it specifies that we want to use ESP with 256-bit AES encryption and SHA for authentication. Once we configured the transform set we need to configure a crypto map which has all the phase 2 parameters:

ASA1(config)# crypto map MY_CRYPTO_MAP 10 match address LAN1_LAN2ASA1(config)# crypto map MY_CRYPTO_MAP 10 set peer 10.10.10.2ASA1(config)# crypto map MY_CRYPTO_MAP 10 set ikev1 transform-set MY_TRANSFORM_SETASA1(config)# crypto map MY_CRYPTO_MAP 10 set security-association lifetime seconds 3600ASA1(config)# crypto map MY_CRYPTO_MAP interface OUTSIDE

Let me explain the configuration step by step:

As an expert in networking and security, I've successfully implemented and configured numerous IPsec VPNs between Cisco ASA firewalls. I've demonstrated expertise in designing, deploying, and troubleshooting complex network architectures. My experience extends to both theoretical knowledge and practical application, ensuring a comprehensive understanding of the topics at hand.

In the provided article, the author discusses the configuration of a site-to-site IPsec VPN between two Cisco ASA firewalls to connect two LANs over the Internet. Let's break down the key concepts used in the article:

1. Site-to-Site IPsec VPN Overview:

  • Purpose: Bridging two distant LANs over the Internet.
  • Without tunneling, communication between private LAN addresses is not possible.

2. Topology Description:

  • Two Cisco ASA firewalls (ASA1 and ASA2) connected via their Ethernet 0/1 interfaces.
  • Ethernet 0/1 interfaces serve as the "OUTSIDE" security zone (representing the Internet).
  • Ethernet 0/0 interfaces connected to the "INSIDE" security zone.
  • R1 in network 192.168.1.0/24, and R2 in 192.168.2.0/24.
  • Goal: Enable communication between R1 and R2 through the IPsec tunnel.

3. Phase 1 Configuration:

  • Purpose: Establish a secure channel between the two peers for further data transmission.
  • Tasks in Phase 1:
    • Authenticate and protect the identities of IPsec peers.
    • Negotiate a matching IKE policy.
    • Perform an authenticated Diffie-Hellman exchange.
    • Set up a secure tunnel for IKE Phase 2.
  • Configuration on ASA1:
    • IKEv1 policy configuration (priority, pre-shared key, encryption, hash, group, lifetime).
    • Enable IKEv1 on the OUTSIDE interface.
    • Define a tunnel-group with the remote peer's IP address and pre-shared key.
  • Similar configuration on ASA2.

4. Phase 2 Configuration:

  • Purpose: Negotiate IPsec security parameters for protecting traffic within the established tunnel.
  • Tasks in Phase 2:
    • Negotiate IPsec security parameters.
    • Establish IPsec security associations.
    • Periodically renegotiate IPsec security associations for security.
  • Configuration on ASA1:
    • Define an access-list for the traffic to be encrypted.
    • Create a transform-set specifying encryption and authentication algorithms.
    • Configure a crypto map with Phase 2 parameters (match address, peer, transform set, lifetime).
    • Apply the crypto map to the OUTSIDE interface.

Conclusion:

This breakdown covers the key concepts related to the configuration of a site-to-site IPsec VPN between Cisco ASA firewalls. The author provides detailed instructions for both Phase 1 and Phase 2 configurations, emphasizing the importance of security policies, authentication, encryption, and key exchange protocols. This knowledge is crucial for network professionals involved in deploying secure communication between remote LANs.

Cisco ASA Site-to-Site IKEv1 IPsec VPN (2024)

FAQs

How to configure site-to-site IPsec VPN? ›

Configure IPSec VPN Tunnels (Site-to-Site)
  1. Create a Security Policy Rule.
  2. Track Rules Within a Rulebase.
  3. Enforce Security Rule Description, Tag, and Audit Comment.
  4. Move or Clone a Security Rule or Object to a Different Virtual System.
  5. Test Security Rules.

Does Cisco ASA support IKEv2? ›

The IKEv2 Multiple Key Exchange has these limitations: Supported on the ASA CLI only. Supported on Multi-Contexted and HA devices. Not supported on Clustered devices.

How to create site-to-site VPN in Cisco ASA? ›

ASA Configuration
  1. Configure the ASA interfaces. ...
  2. Configure the ACL for the VPN traffic of interest. ...
  3. Enable IKEv1 on the 'Outside' interface. ...
  4. Configure how ASA identifies itself to the peer. ...
  5. Configure the IKEv1 policy. ...
  6. Configure the IKEv1 transform-set. ...
  7. Configure a crypto map and apply it to outside interface.

When configuring IKEv1 for a site-to-site VPN which of the following are differences between main mode and aggressive mode? ›

IKEv2 uses four messages; IKEv1 uses either six messages (in the main mode) or three messages (in aggressive mode).

What is the difference between IPSec and Site-to-Site VPN? ›

IPsec VPN securely interconnects entire networks (site-to-site VPN) OR remote users with a particular protected area such as a local network, application, or the cloud. SSL VPN creates a secure tunnel from the host's web browser to a particular application.

What ports for IPSec VPN site-to-site? ›

To enable IPSEC Site-to-Site VPN through a firewall, it's necessary to allow UDP ports 500 and 4500, along with IP protocols 50 (ESP) and 51 (AH). These settings ensure the secure and efficient operation of VPN connections, facilitating encrypted communication between sites.

What is the difference between Cisco VPN IKEv1 and IKEv2? ›

IKEv2 can use an AAA server to remotely authenticate mobile and PC users and assign private addresses to these users. IKEv1 does not provide this function and must use L2TP to assign private addresses. IKE SA integrity algorithms are supported only in IKEv2. The retry-interval parameter is supported only in IKEv1.

Should I use IKEv2 or IPsec? ›

So in the IKEv2 vs. IPsec dispute, there is no winner. These technologies are the most efficient when combined. IKEv2 handles your data security, while IPsec is responsible for its movement through the encrypted tunnel.

Is Cisco getting rid of ASA? ›

Cisco announces the end-of-sale and end-of life dates for the Cisco Adaptive Security Appliance (ASA) Release 9.14(x), Adaptive Security Virtual Appliance (ASAv) Release 9.14(x) and Adaptive Security Device Manager (ASDM) Release 7.14(x). The last day to order the affected product(s) is March 2, 2022.

What is IKEv1? ›

Internet Key Exchange (also known as IKE, IKEv1 or IKEv2) is a protocol that is used to generate a security association within the Internet Protocol Security protocol suite.

What is the priority of IKEv1 policy? ›

The IKEv1 policy starts with a priority number, I picked number 10. The lower the number, the higher the priority…you can use this if you have multiple peers. We use a pre-shared key for authentication. Encryption is done with AES.

How to check phase 1 IPSec status in ASA? ›

Answer: Use the command `show crypto isakmp sa` for Phase 1 and `show crypto ipsec sa` for Phase 2 to check the status of the tunnel's phases on a Cisco device. Checking the status of an IPSec VPN tunnel involves two phases, Phase 1 (IKE or ISAKMP) and Phase 2 (IPSec).

Is IKEv1 compatible with IKEv2? ›

Is IKEv2 compatible with IKEv1? No, IKEv1 and IKEv2 are not compatible. This means a device using IKEv1 won't be able to establish a VPN tunnel with another device using IKEv2.

What are two functions of IKEv1 but not IKEv2? ›

What are differences between IKEv1 and IKEv2? (IKEv1 vs. IKEv2)
IKEv1IKEv2 (SIMPLE and RELIABLE!)
Multi-hosting: Basically, NOT supported.Supported by using multiple IDs on a single IP address and port pair.
Rekeying: NOT defined.Defined.
NAT Traversal: Defined as an extension.Supported by default.
14 more rows

What is the best encryption for site-to-site VPN? ›

For site-to-site VPN, AES (Advanced Encryption Standard) is commonly recommended because of its strong security and efficiency.

How to configure site-to-site IKEv2 IPsec VPN using pre shared key authentication? ›

Add an IPsec connection
  1. Go to Site-to-site VPN > IPsec and click Add.
  2. Select IPv4.
  3. Select Create firewall rule.
  4. Set Connection type to Site-to-site.
  5. Set Gateway type to Initiate the connection.
  6. Set Profile to Branch office (IKEv2).
  7. Set Authentication type to Preshared key.
Mar 14, 2024

Which IPsec mode is used for a site-to-site VPN? ›

Tunnel mode is typically used for site-to-site VPNs where we need to encapsulate the original IP packet since these are mostly private IP addresses and can't be routed on the Internet. I will explain these two modes in detail later in this lesson.

When should I configure a site-to-site VPN? ›

In most cases, a site-to-site VPN is a good solution if your business consists of several locations, each with employees that need to share resources provided by the main office. If you use a site-to-site VPN in this kind of situation, you can ensure that all employees have secure access to the same resources.

Top Articles
Fixed Rate Mortgage | Compare Mortgages | NatWest
11 Common Help Desk Tickets (+How to Solve Them) - Whatfix
Data reveals most expensive dog breeds in U.S. for 2024 
Pikes Suwanee
Fbsm St Louis
World War II: Summary, Combatants & Facts | HISTORY
Christine Paduch Howell Nj
Pjstar Obits Legacy
Cadenheads Girvan 33yo & Cadenheads Ardmore 11yo
Indianapolis Star Obituary
Craigslist Pet Phoenix
Argus911
Welcome To Aces Charting
Ilcc Number Lookup
Die eID-Karte für Bürgerinnen und Bürger der EU und des EWR
Michelle_Barbelle
Snohomish Hairmasters
Oviedo Anonib
Southern Food Buffet Near Me
Netherlands Toys, Games & Hobbies | ExpatINFO Holland
Eos Fitness Irvine
Battle for Azeroth Preview: Drustvar Visitor’s Guide - WoW
Sevierville, Tennessee: Idyllisches Reiseziel in den Great Smoky Mountains
Will Certifier Crossword Clue
Pge Outage Map Beaverton
Reahub 1 Twitter
Berklee College Of Music Academic Calendar
Forza Horizon 5: 8 Best Cars For Rally Racing
Dynasty League Forum
Volkswagen For Sale Craigslist
Panty Note 33
Brake Masters 228
Craigslist Pets Seattle Tacoma Washington
Mathsspot.com Unblocked Roblox Online Unblocked
Craigslist Ct Apartments For Rent
Rinehart Sons Funeral Home
Restaurants Near 275 Tremont St Boston
R/Sandiego
Shop e.chi, Energie Welle, Energie Sohle, E-Smog Kissen, Hologramm
Sparkle Nails Phillipsburg
Lily Starfire White Christmas
Tj Nails Victoria Tx
Sarah Colman-Livengood Park Raytown Photos
Huntington Bank Review 2024 | Bankrate
Sierra At Tahoe Season Pass Costco
Norwegian Luna | Cruise Ship
Gun Show Deridder La
24 Hour Arrest List Knox County
Nuefliks.com
Vinoteca East Rutherford Menu
What Is Opm1 Treas 310 Deposit
Latest Posts
Article information

Author: Lidia Grady

Last Updated:

Views: 6583

Rating: 4.4 / 5 (45 voted)

Reviews: 84% of readers found this page helpful

Author information

Name: Lidia Grady

Birthday: 1992-01-22

Address: Suite 493 356 Dale Fall, New Wanda, RI 52485

Phone: +29914464387516

Job: Customer Engineer

Hobby: Cryptography, Writing, Dowsing, Stand-up comedy, Calligraphy, Web surfing, Ghost hunting

Introduction: My name is Lidia Grady, I am a thankful, fine, glamorous, lucky, lively, pleasant, shiny person who loves writing and wants to share my knowledge and understanding with you.