Configure a Site-to-Site IKEv2 Tunnel Between Two ASAs Using IKEv2 Multiple Key Exchanges (2024)

    Introduction

    This document describes how to configure a Site-To-Site IKEv2 VPN connection between two Cisco ASAs using IKEv2 Multiple Key Exchanges.

    Prerequisites

    Requirements

    Cisco recommends that you have knowledge of these topics:

    • Cisco Adaptive Security Appliance (ASA)
    • General IKEv2 Concepts

    Components Used

    The information in this document is based on theCisco ASAs running 9.20.1.

    The information in this document was created from the devices in a specific lab environment. All of the devices used in this document started with a cleared (default) configuration. If your network is live, ensure that you understand the potential impact of any command.

    Limitations

    The IKEv2 Multiple Key Exchange has these limitations:

    • Supported on the ASA CLI only
    • Supported on Multi-Contexted and HA devices
    • Not supported on Clustered devices

    Licensing

    The licensing requirements are the same as for Site-to-Site VPN on the ASAs.

    Background Information

    Need for Additional Key Exchanges

    The arrival of big quantum computers poses a big risk to security systems, especially those using public-key cryptography. Cryptographic methods that were thought to be very hard for regular computers can be broken easily by quantum computers. So, the need arises to switch to new, quantum-resistant methods, also called post-quantum cryptography (PQC) algorithms. The aim is to enhance the security of IPsec communication by using multiple key exchanges. This involves combining a traditional key exchange with a post-quantum one. This approach ensures that the resulting exchange is at least as strong as the traditional key exchange, providing an added layer of security.

    The plan is to improve IKEv2 by adding support for multiple key exchanges. These extra key exchanges can handle algorithms that are safe from quantum threats. To exchange information about these additional keys, a new message type called Intermediate Exchange is introduced. These key exchanges are negotiated using the regular IKEv2 method, through the SA payload.

    Configure

    This section describes the ASA configurations.

    Network Diagram

    The information in this document uses this network setup:

    Configure a Site-to-Site IKEv2 Tunnel Between Two ASAs Using IKEv2 Multiple Key Exchanges (1)

    ASA Configuration

    Configure the ASA Interfaces

    If the ASA interfaces are not configured, ensure that you configure at least the IP addresses, interface names, and security levels:

    interface GigabitEthernet0/0nameif outsidesecurity-level 0ip address 10.10.10.10 255.255.255.0!interface GigabitEthernet0/1nameif insidesecurity-level 100ip address 192.168.0.1 255.255.255.0

    Configure a Site-to-Site IKEv2 Tunnel Between Two ASAs Using IKEv2 Multiple Key Exchanges (2)

    Note: Ensure that there is connectivity to both the internal and external networks, especially to the remote peer that is used to establish a site-to-site VPN tunnel. You can use a ping in order to verify basic connectivity.

    Configure the IKEv2 Policy with Multiple Key Exchange and Enable IKEv2 on the Outside Interface

    In order to configure the IKEv2 policies for these connections, enter these commands:

    crypto ikev2 policy 10 encryption aes-256 integrity sha256 group 20 prf sha256 lifetime seconds 86400

    Additional key exchange transforms can be configured under crypto ikev2 policyusing the additional-key-exchangecommand. A total of seven additional exchange transforms can be configured. In this example,two additional exchange transforms have been configured (using DH groups 21 and 31).

     additional-key-exchange 1 key-exchange-method 21 additional-key-exchange 2 key-exchange-method 31

    The final IKEv2 policy looks like this:

    crypto ikev2 policy 10 encryption aes-256 integrity sha256 group 20 prf sha256 lifetime seconds 86400 additional-key-exchange 1 key-exchange-method 21 additional-key-exchange 2 key-exchange-method 31

    Configure a Site-to-Site IKEv2 Tunnel Between Two ASAs Using IKEv2 Multiple Key Exchanges (3)

    Note: An IKEv2 policy match exists when both of the policies from the two peers contain the same authentication, encryption, hash, Diffie-Hellman parameter, and Additional Key Exchange parameter values.

    You must enable IKEv2 on the interface that terminates the VPN tunnel. Typically, this is the outside (or internet) interface. In order to enable IKEv2, enter the crypto ikev2 enable outside command in global configuration mode.

    Configure the Tunnel Group

    For a Site-to-Site tunnel, the connection profile type is IPSec-l2l. In order to configure the IKEv2 preshared key, enter these commands:

    tunnel-group 10.20.20.20 type ipsec-l2l
    tunnel-group 10.20.20.20 ipsec-attributes
    ikev2 remote-authentication pre-shared-key cisco
    ikev2 local-authentication pre-shared-key cisco

    Configure Interesting Traffic and Crypto ACL

    The ASA uses Access Control Lists (ACLs) in order to differentiate the traffic that must be protected with IPSec encryption from the traffic that does not require protection. It protects the outbound packets that match a permit Application Control Engine (ACE) and ensures that the inbound packets that match a permit ACE have protection.

    object-group network local-network network-object 192.168.0.0 255.255.255.0object-group network remote-network network-object 172.16.10.0 255.255.255.0
    access-list asa-vpn extended permit ip object-group local-network object-group remote-network

    Configure a Site-to-Site IKEv2 Tunnel Between Two ASAs Using IKEv2 Multiple Key Exchanges (4)

    Note: The VPN Peer must have the same ACL in a mirrored format.

    Configure an Identity NAT (Optional)

    Typically, an identity NAT is needed in order to prevent the interesting traffic from hitting the dynamic NAT. The Identity NAT that is configured in this case is:

    nat (inside,outside) source static local-network local-network destination static remote-network remote-network no-proxy-arp route-lookup

    Configure the IKEv2 IPSec Proposal

    The IKEv2 IPSec Proposal is used to define a set of encryption and integrity algorithms in order to protect the data traffic. This proposal must match both VPN Peers in order to build an IPSec SA successfully. The commands used in this case are:

    crypto ipsec ikev2 ipsec-proposal IKEV2_TSET
    protocol esp encryption aes-256
    protocol esp integrity sha-256

    Configure a Crypto Map and Bind it to the Interface

    A crypto map combines all the required configurations and must necessarily contain:

    • An access list to match the traffic that must be encrypted (commonly referred to as Crypto ACL)
    • Peer Identification
    • At least one IKEv2 IPSec Proposal

    The configuration used here is:

    crypto map outside_map 1 match address asa-vpncrypto map outside_map 1 set peer 10.20.20.20crypto map outside_map 1 set ikev2 ipsec-proposal IKEV2_TSET

    The final part is applying this crypto map to the outside (public) interface using thecrypto map outside_map interface outside command.

    Local ASA Final Configuration

    interface GigabitEthernet0/0 nameif outside security-level 0 ip address 10.10.10.10 255.255.255.0 ! interface GigabitEthernet0/1 nameif inside security-level 100 ip address 192.168.0.1 255.255.255.0 !crypto ikev2 policy 10 encryption aes-256 integrity sha256 group 20 prf sha256 lifetime seconds 86400 additional-key-exchange 1 key-exchange-method 21 additional-key-exchange 2 key-exchange-method 31!crypto ikev2 enable outside!tunnel-group 10.20.20.20 type ipsec-l2ltunnel-group 10.20.20.20 ipsec-attributes ikev2 remote-authentication pre-shared-key cisco ikev2 local-authentication pre-shared-key cisco!object-group network local-network network-object 192.168.0.0 255.255.255.0!object-group network remote-network network-object 172.16.10.0 255.255.255.0!access-list asa-vpn extended permit ip object-group local-network object-group remote-network!nat (inside,outside) source static local-network local-network destination static remote-network remote-network no-proxy-arp route-lookup!crypto ipsec ikev2 ipsec-proposal IKEV2_TSET protocol esp encryption aes-256 protocol esp integrity sha-256!crypto map outside_map 1 match address asa-vpncrypto map outside_map 1 set peer 10.20.20.20 crypto map outside_map 1 set ikev2 ipsec-proposal IKEV2_TSET!crypto map outside_map interface outside

    Remote ASA Final Configuration

    interface GigabitEthernet0/0nameif outsidesecurity-level 0ip address 10.20.20.20 255.255.255.0!interface GigabitEthernet0/1nameif insidesecurity-level 100ip address 172.16.10.1 255.255.255.0!crypto ikev2 policy 10encryption aes-256integrity sha256group 20prf sha256lifetime seconds 86400additional-key-exchange 1key-exchange-method 21additional-key-exchange 2key-exchange-method 31!crypto ikev2 enable outside!tunnel-group 10.10.10.10 type ipsec-l2ltunnel-group 10.10.10.10 ipsec-attributesikev2 remote-authentication pre-shared-key ciscoikev2 local-authentication pre-shared-key cisco!object-group network local-networknetwork-object 172.16.10.0 255.255.255.0!object-group network remote-networknetwork-object 192.168.0.0 255.255.255.0!access-list asa-vpn extended permit ip object-group local-network object-group remote-network!nat (inside,outside) source static local-network local-network destination static remote-network remote-network no-proxy-arp route-lookup!crypto ipsec ikev2 ipsec-proposal IKEV2_TSETprotocol esp encryption aes-256protocol esp integrity sha-256!crypto map outside_map 1 match address asa-vpncrypto map outside_map 1 set peer 10.10.10.10crypto map outside_map 1 set ikev2 ipsec-proposal IKEV2_TSET!crypto map outside_map interface outside

    Configure a Site-to-Site IKEv2 Tunnel Between Two ASAs Using IKEv2 Multiple Key Exchanges (5)

    Note: The ACL is in the mirrored format and the pre-shared keys are the same at both ends.

    Verify

    Before you verify if the tunnel is up and that it is passing the traffic, you must ensure that interesting traffic is being sent to the ASAs.

    Configure a Site-to-Site IKEv2 Tunnel Between Two ASAs Using IKEv2 Multiple Key Exchanges (6)

    Note: The packet tracer was used in order to simulate the traffic flow. It can be done using the packet-tracer command;packet-tracer input inside icmp192.168.0.11 8 0 172.16.10.11 detailed on the Local-ASA.

    In order to validate the additional key exchanges, you can use theshow crypto ikev2 sa command. As seen in the output, you can check the AKE parameters in order to validate the selected exchange algorithms.

    Local-ASA# show crypto ikev2 saIKEv2 SAs:Session-id:2, Status:UP-ACTIVE, IKE count:1, CHILD count:1Tunnel-id Local Remote fvrf/ivrf Status Role 246015 10.10.10.10/500 10.20.20.20/500 READY INITIATOR Encr: AES-CBC, keysize: 256, Hash: SHA256, DH Grp:20, Auth sign: PSK, Auth verify: PSK Additional Key Exchange Group: AKE1: 21 AKE2: 31 Life/Active Time: 86400/7 secChild sa: local selector 192.168.0.0/0 - 192.168.0.255/65535 remote selector 172.16.10.0/0 - 172.16.10.255/65535 ESP spi in/out: 0xf41ca3b5/0xda0e693b 

    Troubleshoot

    The mentioned debugs can be used to troubleshoot the IKEv2 tunnel:

    debug crypto ikev2 protocol 127debug crypto ikev2 platform 127

    Configure a Site-to-Site IKEv2 Tunnel Between Two ASAs Using IKEv2 Multiple Key Exchanges (7)

    Note: If you wish to troubleshoot only one tunnel (which must be the case if the device is in production), you must enable debugs conditionally using the debug crypto condition peer X.X.X.X command.

    Configure a Site-to-Site IKEv2 Tunnel Between Two ASAs Using IKEv2 Multiple Key Exchanges (2024)
    Top Articles
    Technical Tip: Dail_up Native VPN (L2TP) is no longer supported in Android 13 and above android version
    Filecoin Price Prediction - Is It Good to Invest or Avoid?
    English Bulldog Puppies For Sale Under 1000 In Florida
    Katie Pavlich Bikini Photos
    Gamevault Agent
    Pieology Nutrition Calculator Mobile
    Hocus Pocus Showtimes Near Harkins Theatres Yuma Palms 14
    Hendersonville (Tennessee) – Travel guide at Wikivoyage
    Compare the Samsung Galaxy S24 - 256GB - Cobalt Violet vs Apple iPhone 16 Pro - 128GB - Desert Titanium | AT&T
    Vardis Olive Garden (Georgioupolis, Kreta) ✈️ inkl. Flug buchen
    Craigslist Dog Kennels For Sale
    Things To Do In Atlanta Tomorrow Night
    Non Sequitur
    Crossword Nexus Solver
    How To Cut Eelgrass Grounded
    Pac Man Deviantart
    Alexander Funeral Home Gallatin Obituaries
    Shasta County Most Wanted 2022
    Energy Healing Conference Utah
    Geometry Review Quiz 5 Answer Key
    Hobby Stores Near Me Now
    Icivics The Electoral Process Answer Key
    Allybearloves
    Bible Gateway passage: Revelation 3 - New Living Translation
    Yisd Home Access Center
    Home
    Shadbase Get Out Of Jail
    Gina Wilson Angle Addition Postulate
    Celina Powell Lil Meech Video: A Controversial Encounter Shakes Social Media - Video Reddit Trend
    Walmart Pharmacy Near Me Open
    Marquette Gas Prices
    A Christmas Horse - Alison Senxation
    Ou Football Brainiacs
    Access a Shared Resource | Computing for Arts + Sciences
    Vera Bradley Factory Outlet Sunbury Products
    Pixel Combat Unblocked
    Movies - EPIC Theatres
    Cvs Sport Physicals
    Mercedes W204 Belt Diagram
    Mia Malkova Bio, Net Worth, Age & More - Magzica
    'Conan Exiles' 3.0 Guide: How To Unlock Spells And Sorcery
    Teenbeautyfitness
    Where Can I Cash A Huntington National Bank Check
    Topos De Bolos Engraçados
    Sand Castle Parents Guide
    Gregory (Five Nights at Freddy's)
    Grand Valley State University Library Hours
    Holzer Athena Portal
    Hello – Cornerstone Chapel
    Stoughton Commuter Rail Schedule
    Selly Medaline
    Latest Posts
    Article information

    Author: Kimberely Baumbach CPA

    Last Updated:

    Views: 6470

    Rating: 4 / 5 (61 voted)

    Reviews: 84% of readers found this page helpful

    Author information

    Name: Kimberely Baumbach CPA

    Birthday: 1996-01-14

    Address: 8381 Boyce Course, Imeldachester, ND 74681

    Phone: +3571286597580

    Job: Product Banking Analyst

    Hobby: Cosplaying, Inline skating, Amateur radio, Baton twirling, Mountaineering, Flying, Archery

    Introduction: My name is Kimberely Baumbach CPA, I am a gorgeous, bright, charming, encouraging, zealous, lively, good person who loves writing and wants to share my knowledge and understanding with you.