Imran,
IC your point...
these 2 are different things either. using group for isakmp auth or
traditional method (with 0.0.0.0 keyword).
It's looks like if you don't want to use key+IP then you can just get on
with group key <XXXX> option.
So in a nutshell, we still have 2 options. your original question was what
is difference between using
cypto isakmp key cisco123 address x.x.x.x
vs
crypto isakmp client configuration group cisco1 > key cisco
Answer:
first option authenticates key+ip addie or with 0.0.0.0 just IP address and
second option only key.
Looks like it may have been added later for isakmp modular configuration.
FROG(config)#
FROG(config)#crypto isakmp policy 1
FROG(config-isakmp)#hash md5
FROG(config-isakmp)#authentication pre-share
FROG(config-isakmp)#crypto isakmp key cisco123 address 99.99.99.1
FROG(config)#crypto isakmp key cisco123 address 0.0.0.0 0.0.0.0
FROG(config)#crypto isakmp client configuration address-pool local RTP-POOL
FROG(config)#!
FROG(config)#crypto ipsec transform-set rtpset esp-des esp-md5-hmac
FROG(cfg-crypto-trans)#!
FROG(cfg-crypto-trans)#
FROG(cfg-crypto-trans)#exit
FROG(config)#
FROG(config)#
FROG(config)#do sh ver | in 12.4
Cisco IOS Software, 3700 Software (C3725-ADVENTERPRISEK9-M), Version
12.4(15)T5, RELEASE SOFTWARE (fc4)
ROM: 3700 Software (C3725-ADVENTERPRISEK9-M), Version 12.4(15)T5, RELEASE
SOFTWARE (fc4)
FROG(config)#
FROG(config)#do sh run | in ipsec
crypto ipsec transform-set rtpset esp-des esp-md5-hmac
FROG(config)#
FROG(config)#do sh run | in crypto
crypto isakmp policy 1
crypto isakmp key cisco123 address 99.99.99.1
crypto isakmp key cisco123 address 0.0.0.0 0.0.0.0
crypto isakmp client configuration address-pool local RTP-POOL
crypto ipsec transform-set rtpset esp-des esp-md5-hmac
FROG(config)#
FROG(config)#
FROG(config)#
On Mon, Feb 7, 2011 at 11:32 PM, imran ali <immrccie_at_gmail.com> wrote:
> Thanks for reply
>
> what i was asking was in traditional ezvpn config we dont issue this
> command
>
> crypto isakmp key 0 cisco address 0.0.0.0 0.0.0.0
>
> as now isakmp authentication is handled by group configuration ie
>
> *crypto isakmp client configuration group cisco*
>  key cisco
>
> i have tested DVTI  and it works without  " crypto isakmp key " command .
>
> i guess the command is their in doc by mistake .
>
>
>
> On Mon, Feb 7, 2011 at 3:20 PM, Radioactive Frog <pbhatkoti_at_gmail.com>wrote:
>
>>
>> Imran,
>>
>> There are 2 types of authentications in DVTI.
>> a) Pre-shared
>> b) Certificates.
>>
>> Your example is using pre-shared key.
>> Typically, pre-shard key authenticaiton to work a common keys are defined
>> on each routers (server & client). The key definition binds the key to the
>> remote peer's ISAKMP identity. ISAKMP identity should be unique for each
>> site that connects to central/hub site (kind of best practice).
>>
>>
>> The syntax of remove vpn client to authenticate is:
>> *crypto isakmp key <key string> <ip address>
>> **
>> *in your example - let's look closely what you've:
>>
>> >>>crypto isakmp key 0 cisco123 address 0.0.0.0 0.0.0.0 "
>>
>> Hint: you're using DVTI not SVTI. In dvti you know what the connecting
>> party's IP address is. If you don't know the addres you (coz its Dynamic,
>> like client using an ISP with dynamic ip address), you are basically
>> ignoring the IP address field by just putting 0.0.0.0 but only
>> authenticating ISAKMP phase with "key string".
>>
>> In other words, 0.0.0.0 simply means that you are only authenticating "Key
>> string" and not key string+IPaddress.
>>
>>
>> HTH
>>
>>
>> On Mon, Feb 7, 2011 at 8:27 PM, imran ali <immrccie_at_gmail.com> wrote:
>>
>>> Hi group,
>>>
>>> refering to doc link
>>>
>>> http://www.cisco.com/en/US/prod/collateral/iosswrel/ps6537/ps6586/ps6635/prod_white_paper0900aecd803645b5.html
>>>
>>> i don't understand why " crypto isakmp key 0 cisco123 address 0.0.0.0
>>> 0.0.0.0 " command is used . IN a traditional ezpvn scenario
>>>
>>> we just need group authentication and xauth authentication.
>>>
>>>
>>>
>>> any suggestions ?
>>>
>>> here is the config
>>>
>>>
>>>
>>> hostname c3725-21
>>>  !
>>>  aaa new-model
>>>  !
>>>  aaa authentication login default local
>>>  aaa authorization network default local
>>>  !
>>>  aaa session-id common
>>>  !
>>>  resource policy
>>>  !
>>>  ip subnet-zero
>>>  ip cef
>>>  !
>>>  !
>>>  username cisco privilege 15 password 0 cisco
>>>  !
>>>  policy-map FOO
>>>  class class-default
>>>   shape average 1280000
>>>  !
>>>  !
>>>  crypto isakmp policy 1
>>>  encr 3des
>>>  authentication pre-share
>>>  group 2
>>>  *crypto isakmp key cisco123 address 0.0.0.0 0.0.0.0*
>>>  crypto isakmp keepalive 10
>>>  !
>>>  *crypto isakmp client configuration group cisco*
>>>  key cisco
>>>  dns 6.0.0.2
>>>  wins 7.0.0.1
>>>  domain cisco.com
>>>  pool dpool
>>>  acl 101
>>>  crypto isakmp profile vi
>>>    match identity group cisco
>>>    isakmp authorization list default
>>>    client configuration address respond
>>>    virtual-template 1
>>>  !
>>>  !
>>>  crypto ipsec transform-set set esp-3des esp-sha-hmac
>>>  !
>>>  crypto ipsec profile vi
>>>  set transform-set set
>>>  set isakmp-profile vi
>>>  !
>>>  interface FastEthernet0/0
>>>  ip address 10.0.149.221 255.255.255.0
>>>  duplex auto
>>>  speed auto
>>>  !
>>>  interface FastEthernet0/1
>>>  ip address 192.168.20.21 255.255.255.0
>>>  duplex auto
>>>  speed 100
>>>  !
>>>  !
>>>  interface Virtual-Template1 type tunnel
>>>  ip unnumbered FastEthernet0/0
>>>  tunnel source FastEthernet0/0
>>>  tunnel mode ipsec ipv4
>>>  tunnel protection ipsec profile vi
>>>  service-policy output FOO
>>>  !
>>>  router eigrp 1
>>>  network 192.168.1.0
>>>  network 192.168.20.0
>>>  no auto-summary
>>>  !
>>>  ip local pool dpool 5.0.0.1 5.0.0.3
>>>  ip classless
>>>  ip route 0.0.0.0 0.0.0.0 10.0.149.207
>>>  !
>>>  access-list 101 permit ip 192.168.20.0 0.0.0.255 any
>>>  !
>>>  control-plane
>>>  !
>>>  !
>>>  end
>>>
>>> C831 Spoke Router with DVTI Configuration
>>>
>>> C1751 Spoke Router with Traditional Easy VPN Configuration
>>>  version 12.3
>>>  !
>>>  hostname c1751-16
>>>  !
>>>  enable password lab
>>>  !
>>>  username cisco privilege 15 password 0 cisco
>>>  !
>>>  no aaa new-model
>>>  ip subnet-zero
>>>  !
>>>  !
>>>  ip cef
>>>  ip domain name cisco.com
>>>  !
>>>  crypto isakmp policy 1
>>>  encr 3des
>>>  authentication pre-share
>>>  group 2
>>>  crypto isakmp key cisco123 address 0.0.0.0 0.0.0.0
>>>  crypto isakmp keepalive 10
>>>  !
>>>  crypto ipsec client ezvpn ez
>>>  connect manual
>>>  group cisco key cisco
>>>  local-address FastEthernet0/0
>>>  mode client
>>>  peer 10.0.149.221
>>>  !
>>>  interface Loopback0
>>>  ip address 5.0.0.3 255.255.255.255
>>>  !
>>>  interface Ethernet0/0
>>>  ip address 192.168.16.1 255.255.255.0
>>>   half-duplex
>>>  crypto ipsec client ezvpn ez inside
>>>  !
>>>  interface FastEthernet0/0
>>>  description $ETH-LAN$$ETH-SW-LAUNCH$
>>>  ip address dhcp
>>>  speed 100
>>>  full-duplex
>>>  crypto ipsec client ezvpn ez
>>>  !
>>>  ip classless
>>>  ip route 10.0.149.0 255.255.255.0 dhcp
>>>  !
>>>  end
>>>
>>>
>>> Blogs and organic groups at http://www.ccie.net
>>>
>>> _______________________________________________________________________
>>> Subscription information may be found at:
>>> http://www.groupstudy.com/list/CCIELab.html
Blogs and organic groups at http://www.ccie.net
Received on Tue Feb 08 2011 - 00:20:56 ART
This archive was generated by hypermail 2.2.0 : Tue Mar 01 2011 - 07:01:49 ART