IP Security VPN Monitoring  [Support] (2024)

Download this chapter

Feedback

Contents

  • IP Security VPN Monitoring
  • Finding Feature Information
  • Prerequisites for IP Security VPN Monitoring
  • Restrictions for IP Security VPN Monitoring
  • Information About IPSec VPN Monitoring
  • Background Crypto Sessions
  • Per-IKE Peer Description
  • Summary Listing of Crypto Session Status
  • Syslog Notification for Crypto Session Up or Down Status
  • IKE and IPSec Security Exchange Clear Command
  • How to Configure IP Security VPN Monitoring
  • Adding the Description of an IKE Peer
  • Verifying Peer Descriptions
  • Clearing a Crypto Session
  • Configuration Examples for IP Security VPN Monitoring
  • show crypto session Command Output Examples
  • Additional References
  • Feature Information for IP Security VPN Monitoring

Last Updated: August 7, 2012

The IP Security VPN Monitoring feature provides the following Virtual Private Network (VPN) session monitoring enhancements to troubleshoot and monitor the end-user interface:

  • Ability to specify an Internet Key Exchange (IKE) peer description in the configuration file
  • Summary listing of crypto session status
  • Syslog notification for crypto session up or down status
  • Ability to clear both IKE and IP Security (IPSec) security associations (SAs) using one command-line interface (CLI)
  • Finding Feature Information
  • Prerequisites for IP Security VPN Monitoring
  • Restrictions for IP Security VPN Monitoring
  • Information About IPSec VPN Monitoring
  • How to Configure IP Security VPN Monitoring
  • Configuration Examples for IP Security VPN Monitoring
  • Additional References
  • Feature Information for IP Security VPN Monitoring

Finding Feature Information

Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the Feature Information Table at the end of this document.

Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.

Prerequisites for IP Security VPN Monitoring

  • You should be familiar with IPSec and encryption.
  • Your router must support IPSec, and before using the IP Security VPN Monitoring feature, you must have configured IPSec on your router.

Restrictions for IP Security VPN Monitoring

  • You must be running Cisco IOS k8 or k9 crypto images on your router.

Information About IPSec VPN Monitoring

  • Background Crypto Sessions
  • Per-IKE Peer Description
  • Summary Listing of Crypto Session Status
  • Syslog Notification for Crypto Session Up or Down Status
  • IKE and IPSec Security Exchange Clear Command

Background Crypto Sessions

A crypto session is a set of IPSec connections (flows) between two crypto endpoints. If the two crypto endpoints use IKE as the keying protocol, they are IKE peers to each other. Typically, a crypto session consists of one IKE security association (for control traffic) and at least two IPSec security associations (for data traffic--one per each direction). There may be duplicated IKE security associations (SAs) and IPSec SAs or duplicated IKE SAs or IPSec SAs for the same session in the duration of rekeying or because of simultaneous setup requests from both sides.

Per-IKE Peer Description

The Per-IKE Peer Description function allows you to enter a description of your choosing for an IKE peer. (Before Cisco IOS Release 12.3(4)T, you could use only the IP address or fully qualified domain name [FQDN] to identify the peer; there was no way to configure a description string.) The unique peer description, which can include up to 80 characters, can be used whenever you are referencing that particular IKE peer. To add the peer description, use the description command.

IP Security VPN Monitoring  [Support] (2)
Note

IKE peers that "sit" behind a Network Address Translation (NAT) device cannot be uniquely identified; therefore, they have to share the same peer description.

The primary application of this description field is for monitoring purposes (for example, when using show commands or for logging [syslog messages]). The description field is purely informational (for example, it cannot act as a substitute for the peer address or FQDN when defining crypto maps).

Summary Listing of Crypto Session Status

You can get a list of all the active VPN sessions by entering the show crypto session command. The listing will include the following:

  • Interface
  • IKE peer description, if available
  • IKE SAs that are associated with the peer by whom the IPSec SAs are created
  • IPSec SAs serving the flows of a session

Multiple IKE or IPSec SAs may be established for the same peer (for the same session), in which case IKE peer descriptions will be repeated with different values for the IKE SAs that are associated with the peer and for the IPSec SAs that are serving the flows of the session.

You can also use the show crypto session detail variant of this command to obtain more detailed information about the sessions.

Syslog Notification for Crypto Session Up or Down Status

The Syslog Notification for Crypto Session Up or Down Status function provides syslog notification every time the crypto session comes up or goes down.

The following is a sample syslog notification showing that a crypto session is up:

%CRYPTO-5-SESSION_STATUS: Crypto session is UP. Peer 10.6.6.1:500 fvrf=name10 ivrf=name20 Description: SJC24-2-VPN-Gateway Id: 10.5.5.2

The following is a sample syslog notification showing that a crypto session is down:

%CRYPTO-5-SESSION_STATUS: Crypto session is DOWN. Peer 10.6.6.1:500 fvrf=name10 ivrf=name20 Description: SJC24-2-VPN-Gateway Id: 10.5.5.2 

IKE and IPSec Security Exchange Clear Command

In previous IOS versions, there was no single command to clear both IKE and IPSec connections (that is, SAs). Instead, you had to use the clear crypto isakmp command to clear IKE and the clear crypto ipsec command to clear IPSec. The new clear crypto session command allows you to clear both IKE and IPSec with a single command. To clear a specific crypto session or a subset of all the sessions (for example, a single tunnel to one remote site), you need to provide session-specific parameters, such as a local or remote IP address, a local or remote port, a front door VPN routing and forwarding (FVRF) name, or an inside VRF (IVRF) name. Typically, the remote IP address will be used to specify a single tunnel to be deleted.

If a local IP address is provided as a parameter when you use the clear crypto session command, all the sessions (and their IKE SAs and IPSec SAs) that share the IP address as a local crypto endpoint (IKE local address) will be cleared. If you do not provide a parameter when you use the clear crypto session command, all IPSec SAs and IKE SAs that are in the router will be deleted.

How to Configure IP Security VPN Monitoring

  • Adding the Description of an IKE Peer
  • Verifying Peer Descriptions
  • Clearing a Crypto Session

Adding the Description of an IKE Peer

To add the description of an IKE peer to an IPSec VPN session, perform the following steps.

SUMMARY STEPS

1. enable

2. configure terminal

3. crypto isakmp peer {ip-addressip-address}

4. description

DETAILED STEPS

Command or ActionPurpose

Step1

enable

Example:

Router> enable

Enables privileged EXEC mode.

  • Enter your password if prompted.

Step2

configure terminal

Example:

Router# configure terminal

Enters global configuration mode.

Step3

crypto isakmp peer {ip-addressip-address}

Example:

Router (config)# crypto isakmp peer address 10.2.2.9

Enables an IPSec peer for IKE querying of authentication, authorization, and accounting (AAA) for tunnel attributes in aggressive mode and enters ISAKMP peer configuration mode.

Step4

description

Example:

Router (config-isakmp-peer)# description connection from site A

Adds a description for an IKE peer.

Verifying Peer Descriptions

To verify peer descriptions, use the show crypto isakmp peer command.

SUMMARY STEPS

1. enable

2. show crypto isakmp peer

DETAILED STEPS

Command or ActionPurpose

Step1

enable

Example:

Router> enable

Enables privileged EXEC mode.

  • Enter your password if prompted.

Step2

show crypto isakmp peer

Example:

Router# show crypto isakmp peer

Displays peer descriptions.

Examples

The following output example verifies that the description "connection from site A" has been added for IKE peer 10.2.2.9:

Router# show crypto isakmp peerPeer: 10.2.2.9 Port: 500 Description: connection from site A flags: PEER_POLICY

When the peer at address 10.2.2.9 connects and the session comes up, the syslog status will be shown as follows:

%CRYPTO-5-SESSION_STATUS: Crypto tunnel is UP. Peer 10.2.2.9:500 Description: connection from site A Id: ezvpn

The following output example verifies that the description "connection from site A" has been added for IKE peer 10.2.2.9:

Router# show crypto isakmp peerPeer: 10.2.2.9 Port: 500 Description: connection from site A flags: PEER_POLICY

When the peer at address 10.2.2.9 connects and the session comes up, the syslog status will be shown as follows:

%CRYPTO-5-SESSION_STATUS: Crypto tunnel is UP. Peer 10.2.2.9:500 Description: connection from site A Id: ezvpn

Clearing a Crypto Session

To clear a crypto session, use the clear crypto session command from the router command line. No configuration statements are required in the configuration file to use this command.

SUMMARY STEPS

1. enable

2. clear crypto session

DETAILED STEPS

Command or ActionPurpose

Step1

enable

Example:

Router> enable

Enables privileged EXEC mode.

  • Enter your password if prompted.

Step2

clear crypto session

Example:

Router# clear crypto session

Deletes crypto sessions (IPSec and IKE SAs).

Configuration Examples for IP Security VPN Monitoring

  • show crypto session Command Output Examples

show crypto session Command Output Examples

The following is sample output for the show crypto session output without the detail keyword:

Router# show crypto sessionCrypto session current statusInterface: FastEthernet0/1Session status: UP-ACTIVEPeer: 172.0.0.2/500 IKE SA: local 172.0.0.1/500 remote 172.0.0.2/500 Active IPSEC FLOW: permit ip 10.10.10.0/255.255.255.0 10.30.30.0/255.255.255.0 Active SAs: 2, origin: crypto map

The following is sample output using the show crypto session command and the detail keyword:

Router# show crypto session detailInterface: Tunnel0Session status: UP-ACTIVEPeer: 10.1.1.3 port 500 fvrf: (none) ivrf: (none) Desc: this is my peer at 10.1.1.3:500 Green Phase1_id: 10.1.1.3 IKE SA: local 10.1.1.4/500 remote 10.1.1.3/500 Active Capabilities:(none) connid:3 lifetime:22:03:24 IPSEC FLOW: permit 47 host 10.1.1.4 host 10.1.1.3 Active SAs: 0, origin: crypto map Inbound: #pkts dec'ed 0 drop 0 life (KB/Sec) 0/0 Outbound: #pkts enc'ed 0 drop 0 life (KB/Sec) 0/0 IPSEC FLOW: permit ip host 10.1.1.4 host 10.1.1.3 Active SAs: 4, origin: crypto map Inbound: #pkts dec'ed 4 drop 0 life (KB/Sec) 4605665/2949 Outbound: #pkts enc'ed 4 drop 1 life (KB/Sec) 4605665/2949

Additional References

Related Documents

Related Topic

Document Title

IP security, encryption, and IKE

  • Configuring Internet Key Exchange for IPsec VPNs
  • Configuring Security for VPNs with IPsec

Security commands

Cisco IOS Security Command Reference

MIBs

MIBs

MIBs Link

None.

To locate and download MIBs for selected platforms, Cisco IOS software releases, and feature sets, use Cisco MIB Locator found at the following URL:

http://www.cisco.com/go/mibs

Technical Assistance

Description

Link

The Cisco Support and Documentation website provides online resources to download documentation, software, and tools. Use these resources to install and configure the software and to troubleshoot and resolve technical issues with Cisco products and technologies. Access to most tools on the Cisco Support and Documentation website requires a Cisco.com user ID and password.

http://www.cisco.com/cisco/web/support/index.html

Feature Information for IP Security VPN Monitoring

The following table provides release information about the feature or features described in this module. This table lists only the software release that introduced support for a given feature in a given software release train. Unless noted otherwise, subsequent releases of that software release train also support that feature.

Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.

Table 1Feature Information for IP Security VPN Monitoring

Feature Name

Releases

Feature Information

IP Security VPN Monitoring

12.3(4)T

The IP Security VPN Monitoring feature provides the following Virtual Private Network (VPN) session monitoring enhancements to troubleshoot and monitor the end-user interface:

  • Ability to specify an Internet Key Exchange (IKE) peer description in the configuration file
  • Summary listing of crypto session status
  • Syslog notification for crypto session up or down status
  • Ability to clear both IKE and IP Security (IPSec) security associations (SAs) using one command-line interface (CLI)

This feature was introduced in Cisco IOS Release 12.3(4)T.

The following commands were introduced or modified: clear crypto session, description (isakmp peer), show crypto isakmp peers, show crypto session .

Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R)

Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental.

© 2012 Cisco Systems, Inc. All rights reserved.


IP Security VPN Monitoring  [Support] (2024)

FAQs

How to monitor IPSec VPN? ›

Monitoring IPsec VPN tunnels
  1. Go to VPN Manager > Monitor.
  2. Find and select the tunnel or tunnels that you need to bring up or down in the list.
  3. Click Bring Tunnel Up or Bring Tunnel Down from the toolbar or right-click menu.
  4. Select OK in the confirmation dialog box to apply the change.

How can you monitor VPN traffic on a Palo Alto firewall? ›

Tunnel Monitoring
  1. For a VPN tunnel, you can check connectivity to a destination IP address across the tunnel. ...
  2. If the destination IP address is unreachable, you either configure the firewall to wait for the tunnel to recover or configure an automatic failover to another tunnel.
Apr 2, 2024

How to troubleshoot IPSec VPN Cisco? ›

Check the configuration on both the devices, and make sure that the crypto ACLs match. Another possible reason is a mismatch of the transform set parameters. Verify that at both ends, VPN gateways use the same transform set with the exact same parameters.

How to check VPN tunnel status in Palo Alto? ›

View Tunnel Information in Logs
  1. Monitor. Logs. .
  2. Traffic. , Threat. ...
  3. For a log entry, click the Detailed Log View ( ).
  4. In the Flags window, see if the. Tunnel Inspected. flag is checked. ...
  5. If you are viewing the log for an inside session that is Tunnel Inspected, click the. View Parent Session.

Can VPN activity be monitored? ›

You can't be tracked using a VPN because it encrypts your data. As a result, your ISP or bad actors can't get any information out of your traffic. They only see the VPN server's IP address (e.g. if you're connected to a US server, the US IP address is visible), while your real IP and online activities stay hidden.

How do I know if my IPsec is working? ›

The easiest test for an IPsec tunnel is a ping from one client station behind the firewall to another on the opposite side. If that works, the tunnel is up and working properly.

How do I check my IPsec settings? ›

To view status information about active IPsec tunnels, use the show ipsec tunnel command. This command prints status output for all IPsec tunnels, and it also supports printing tunnel information individually by providing the tunnel ID.

How do I reset my IPsec VPN? ›

  1. Select. Network. IPSec Tunnels. and select the tunnel you want to refresh or restart.
  2. In the row for that tunnel, under the Status column, click. Tunnel Info. .
  3. At the bottom of the Tunnel Info screen, click the action you want: Refresh. —Updates the onscreen statistics. Restart.

Which method can be used when troubleshooting IPsec VPN issues? ›

If you clear ISAKMP (Phase I) and IPsec (Phase II) security associations (SAs), it is the simplest and often the best solution to resolve IPsec VPN problems. If you clear SAs, you can frequently resolve a wide variety of error messages and strange behaviors without the need to troubleshoot.

How can I check if my VPN is working? ›

How to check if a VPN is working
  1. Turn off your VPN.
  2. Visit WhatIsMyIPAddress.com. You'll see your public IP address — the one that's assigned to you by your internet service provider (ISP). ...
  3. Turn on your VPN and connect to a server in your chosen location. ...
  4. Check your IP address again using the same method as before.
Jun 24, 2024

How do I check my VPN problem? ›

How do I check if a VPN is working? Visit websites such as WhatIsMyIP or IPLocation to see your original IP address. After connecting to a VPN, revisit the IP address checking website to recheck your IP address. The VPN works if the displayed IP address differs from your original IP address.

How do I test my VPN tunnel? ›

To verify that your VPN tunnel is working properly, it is necessary to ping the IP address of a computer on the remote network. By pinging the remote network, you send data packets to the remote network and the remote network replies that it has received the data packets.

How do I check my IPsec log? ›

If possible, examine logs from the devices at both ends of the IPsec tunnel for more information. Tip: Right-click a VPN log entry and select Search Related Events to see logs related to the same IPsec VPN negotiation. You can collect more detailed information by enabling the IPsec diagnostics.

How do you detect a VPN tunnel? ›

If you know someone to be based in a specific location but the IP address location is different, it's likely they're using a VPN. You can also use IP address checkers to see the ISP. By looking up the ISP in question, you may be able to find out if it's associated with a particular VPN provider.

Is it possible to detect VPN usage? ›

VPNs can be detected through simple mechanisms like comparing the actual browser timezone with the target server's exit node or by using databases that store information about whether a given IP address belongs to the VPN.

How do I check VPN security? ›

How to tell if a VPN is working
  1. Check your IP address. Take note of your current IP address, connect to a VPN server, and recheck the IP address. ...
  2. Check for DNS leaks. ...
  3. Check for WebRTC leaks. ...
  4. Check your VPN status. ...
  5. Test your internet speed.
Dec 3, 2023

Top Articles
How to Sell Put Options to Benefit in Any Market
The Ultimate Guide to Creating a More Ethical Wardrobe on a Budget - Good On You
Omega Pizza-Roast Beef -Seafood Middleton Menu
Craigslist Mexico Cancun
Oxford House Peoria Il
Hssn Broadcasts
Programmieren (kinder)leicht gemacht – mit Scratch! - fobizz
Marion County Wv Tax Maps
Echo & the Bunnymen - Lips Like Sugar Lyrics
Elizabethtown Mesothelioma Legal Question
A rough Sunday for some of the NFL's best teams in 2023 led to the three biggest upsets: Analysis - NFL
Eka Vore Portal
Alexandria Van Starrenburg
Louisiana Sportsman Classifieds Guns
979-200-6466
Download Center | Habasit
Georgia Vehicle Registration Fees Calculator
Sizewise Stat Login
Craigslist Pet Phoenix
Sulfur - Element information, properties and uses
Yog-Sothoth
Rust Belt Revival Auctions
Amelia Chase Bank Murder
Jesus Revolution Showtimes Near Regal Stonecrest
Acurafinancialservices Com Home Page
Panolian Batesville Ms Obituaries 2022
Meijer Deli Trays Brochure
WPoS's Content - Page 34
Play It Again Sports Forsyth Photos
Imagetrend Elite Delaware
Busch Gardens Wait Times
Darktide Terrifying Barrage
Kstate Qualtrics
A Man Called Otto Showtimes Near Carolina Mall Cinema
Goodwill Thrift Store & Donation Center Marietta Photos
Umiami Sorority Rankings
Kelley Blue Book Recalls
Captain Billy's Whiz Bang, Vol 1, No. 11, August, 1920
America's Magazine of Wit, Humor and Filosophy
Noaa Duluth Mn
Weather In Allentown-Bethlehem-Easton Metropolitan Area 10 Days
Cocorahs South Dakota
Winta Zesu Net Worth
Tableaux, mobilier et objets d'art
Centimeters to Feet conversion: cm to ft calculator
Studentvue Calexico
9:00 A.m. Cdt
Vci Classified Paducah
F9 2385
What your eye doctor knows about your health
Skybird_06
Latest Posts
Article information

Author: Roderick King

Last Updated:

Views: 5581

Rating: 4 / 5 (51 voted)

Reviews: 82% of readers found this page helpful

Author information

Name: Roderick King

Birthday: 1997-10-09

Address: 3782 Madge Knoll, East Dudley, MA 63913

Phone: +2521695290067

Job: Customer Sales Coordinator

Hobby: Gunsmithing, Embroidery, Parkour, Kitesurfing, Rock climbing, Sand art, Beekeeping

Introduction: My name is Roderick King, I am a cute, splendid, excited, perfect, gentle, funny, vivacious person who loves writing and wants to share my knowledge and understanding with you.