Cisco IOS XR Configuration Manual page 158

System security configuration guide
Hide thumbs Also See for IOS XR:
Table of Contents

Advertisement

Configuration Examples for an IPSec Network with a Cisco IPSec VPN SPA
# Active IPSec Sessions: 2
SA
-------------------------------------------------------------------------------
503
The following example shows that the service-gre interface is set to 1 with a profile gre:
RP/0/RP0/CPU0:router# show crypto ipsec sa 503
SA id:
Node id:
SA Type:
interface:
profile
local
remote ident (addr/mask/prot/port) : (40.40.40.2/255.255.255.255/47/0)
local crypto endpt: 50.50.50.2, remote crypto endpt: 40.40.40.2, vrf default
#pkts tx
#bytes tx
#pkts encrypt
#pkts digest
#pkts encrpt fail:0
#pkts digest fail:0
#pkts replay fail:0
#pkts tx errors
outbound esp sas:
inbound esp sas:
The following example shows that the interface service-gre command is set to 1:
RP/0/RP0/CPU0:router# show crypto ipsec interface service-gre 1
--------------- IPSec interface ----------------
Interface service-gre1, mode Transport, intf_handle 0x5000880
Locations 0/1/1,
Number of profiles 1, number of flows 1
Tunnel: source 50.50.50.2, destination 40.40.40.2, tunnel VRF default
DF-bit: copy, pre-fragmentation enable
default pmtu: 9216
1 connected flows:
503
Cisco IOS XR System Security Configuration Guide
SC-146
Local Peer
Remote Peer
50.50.50.2
40.40.40.2
503
0/1/1
ISAKMP
service-gre1
:
gre
ident (addr/mask/prot/port) : (50.50.50.2/255.255.255.255/47/0)
:0
:0
:0
:0
:0
spi: 0x5aeffcbd(1525677245)
transform: esp-3des esp-md5-hmac
in use settings = Transport
sa agreed lifetime: 120s, 4194303kb
sa timing: remaining key lifetime (sec/kb): (108/4194303)
sa DPD disabled
sa idle timeout: disable, 0s
sa anti-replay (HW accel): enable, window 64
spi: 0x54373dd3(1412906451)
transform: esp-3des esp-md5-hmac
in use settings = Transport
sa agreed lifetime: 120s, 4194303kb
sa timing: remaining key lifetime (sec/kb): (108/4194303)
sa DPD disabled
sa idle timeout: disable, 0s
sa anti-replay (HW accel): enable, window 64
VRF default (60000000)
Implementing IPSec Network Security on Cisco IOS XR Software
FVRF
Profile
Transform
default
gre
esp-3des esp 120/4194303
#pkts rx
:0
#bytes rx
:0
#pkts decrypt
:0
#pkts verify
:0
#pkts decrpt fail:0
#pkts verify fail:0
#pkts rx errors
:0
Lifetime

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Ios xr 3.5

Table of Contents