实验说明:
- 在R1、R2之间使用快速以太网进行连接
- 在R1上的1.1.1.1/24 希望与R2上的2.2.2.2/24网络之间通过 ipsec vpn
- 采用预共享密钥配置
实验过程:
第一步:基本接口配置 R1(config)#int lo0 R1(config-if)#ip add 1.1.1.1 255.255.255.0 R1(config-if)#int e0/0 R1(config-if)#ip add 192.168.1.1 255.255.255.0 R1(config-if)#no sh R1(config-if)#ip route 0.0.0.0 0.0.0.0 192.168.1.2
R2(config)#int lo0 R2(config-if)#ip add 2.2.2.2 255.255.255.0 R2(config-if)#int e0/0 R2(config-if)#ip add 192.168.1.2 255.255.255.0 R2(config-if)#no sh R2(config-if)#ip route 0.0.0.0 0.0.0.0 192.168.1.1
第二步:配置互联网密钥交换(IKE) R1(config)#crypto isakmp enable //在全局下启动isakmp (默认情况下被启动) R1(config)#crypto isakmp policy 10 //定义isakmp 策略集,以便在ipsec端点之间建立isakmp对等体关系,这里的10是代表的优先级,取值范围在1-10000,1表示优先级最高 R1(config-isakmp)#authentication pre-share // 配置对等体身份验证方法为预共享密钥 R1(config-isakmp)#encryption 3des // 配置消息加密算法为3des R1(config-isakmp)#group 5 //配置密钥交换参数为1536位的Deffie-Hellman R1(config-isakmp)#hash sha //配置消息完整性(散列)算法为SHA-1(160比特签名) R1(config-isakmp)#lifetime 86400 //配置ISAKMP建立的SA的寿命 R1(config)#crypto isakmp key cisco add 192.168.1.2 //配置预共享密钥,密钥为cisco,远程对等体的IP地址为192.168.1.2
R2(config)#Cryp is en R2(config)#Cry is pol 10 R2(config-isakmp)#Aut pre R2(config-isakmp)#Enc 3d R2(config-isakmp)#Gro 5 R2(config-isakmp)#Hash sha R2(config-isakmp)#Life 86400 R2(config-isakmp)#Exit R2(config)#Cryp isa key cisco add 192.168.1.1
第三步:配置ipsec交换集
R1(config)#cry ipsec transform-set R1set esp-3des esp-sha-hmac
//创建一个变换集名为R1set,变换集定义数据流量如何被保护。如果不配置连接模式,默认就是tunnel,即mode tunnel
R1(config)#crypto map R1vpn 10 ipsec-isakmp
// 建立IPSec加密映射,使用ISAKMP建立IPSEC SA,以保护当前加密映射条目指定的数据库
R1(config-crypto-map)#set peer 192.168.1.2
// 指定对等体IP地址
R1(config-crypto-map)#set transform-set R1set
// 指定变换集
R1(config-crypto-map)#match add 100
// 引用扩展ACL
R2(config)# cryp ips transform-set R2set esp-3des esp-sha-hmac
R2(cfg-crypto-trans)#exi
R2(config)#crypto map R2vpn 10 ipsec-isakmp
% NOTE: This new crypto map will remain disabled until a peer
and a valid access list have been configured.
//新的映射没有启用。
R2(config-crypto-map)#set peer 192.168.1.1
R2(config-crypto-map)#set transform-set R2set
R2(config-crypto-map)#match add 100
第四步:定义触发流量,即ipsec连接保护何种流量 R1(config)#access-list 100 permit icmp 1.1.1.1 0.0.0.0 2.2.2.2 0.0.0.0 //定义对什么样的流量进行ipsec保护 R1(config)#int e0/0 R1(config-if)#crypto map R1vpn //将加密映射应用到接口 *Mar 1 00:26:14.451: %CRYPTO-6-ISAKMP_ON_OFF: ISAKMP is ON
R2(config)#access-list 100 permit icmp 2.2.2.2 0.0.0.0 1.1.1.1 0.0.0.0 R2(config)#int e0/0 R2(config-if)#crypto map R2vpn
第五步:使用ping 流量调试ipsec配置 R1#debug crypto isakmp Crypto ISAKMP debugging is on R1#debug crypto ipsec Crypto IPSEC debugging is on R1#ping 2.2.2.2 sou 1.1.1.1
.!!!! Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 2.2.2.2, timeout is 2 seconds: Packet sent with a source address of 1.1.1.1
*Mar 1 00:30:49.951: IPSEC(sa_request): ,
(key eng. msg.) OUTBOUND local= 192.168.1.1, remote= 192.168.1.2,
local_proxy= 1.1.1.1/255.255.255.255/1/0 (type=1),
remote_proxy= 2.2.2.2/255.255.255.255/1/0 (type=1),
protocol= ESP, transform= esp-3des esp-md5-hmac (Tunnel),
lifedur= 3600s and 4608000kb,
spi= 0xDE7C1239(3732673081), conn_id= 0, keysize= 0, flags= 0x400A
*Mar 1 00:30:49.955: ISAKMP: received ke message (1/1)
*Mar 1 00:30:49.955: ISAKMP (0:0): SA request profile is (NULL)
*Mar 1 00:30:49.955: ISAKMP: local port 500, remote port 500
*Mar 1 00:30:49.959: ISAKMP: set new node 0 to QM_IDLE
*Mar 1 00:30:49.959: ISAKMP: insert sa successfully sa = 63D1C4B4
*Mar 1 00:30:49.959: ISAKMP (0:1): Can not start Aggressive mode, trying Main mode.
*Mar 1 00:30:49.959: ISAKMP: Looking for a matching key for 192.168.1.2 in default : success
*Mar 1 00:30:49.959: ISAKMP (0:1): found peer pre-shared key matching 192.168.1.2
*Mar 1 00:30:49.963: ISAKMP (0:1): constructed NAT-T vendor-07 ID
*Mar 1 00:30:49.963: ISAKMP (0:1): constructed NAT-T vendor-03 ID
*Mar 1 00:30:49.963: ISAKMP (0:1): constructed NAT-T vendor-02 ID
*Mar 1 00:30:49.963: ISAKMP (0:1): Input = IKE_MESG_FROM_IPSEC, IKE_SA_REQ_MM
*Mar 1 00:30:49.963: ISAKMP (0:1): Old State = IKE_READY New State = IKE_I_MM1
//这里表明IKE协商已经被发启,主模式中的第一条isakmp消息即将被发送,I表示为发起方,如果为应答方则为R.
*Mar 1 00:30:49.963: ISAKMP (0:1): beginning Main Mode exchange
//这里表示IKE主模式协商即将开始
*Mar 1 00:30:49.963: ISAKMP (0:1): sending packet to 192.168.1.2 my_port 500 peer_port 500 (I) MM_NO_STATE
*Mar 1 00:30:50.163: ISAKMP (0:1): received packet from 192.168.1.2 dport 500 sport 500 Global (I) MM_NO_STATE
//主模式协商以R1为发起方向R2发送IKE sa提议开始,这些提议对应R1上的配置(crypto isakmp policy)
*Mar 1 00:30:50.167: ISAKMP (0:1): Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
*Mar 1 00:30:50.167: ISAKMP (0:1): Old State = IKE_I_MM1 New State = IKE_I_MM2
//IKE交换中的第二第消息
*Mar 1 00:30:50.167: ISAKMP (0:1): processing SA payload. message ID = 0
//开始处理SA有效负载,其中包括被接受的提议,这里的消息ID用于被phase1各phase2中交换的消息区分开来,因此在整个主模式协商期间消息ID始终为0
*Mar 1 00:30:50.171: ISAKMP (0:1): processing vendor id payload
*Mar 1 00:30:50.171: ISAKMP (0:1): vendor ID seems U
Success rate is 80 percent (4/5), round-trip min/avg/max = 32/40/52 ms
R1#nity/DPD but major 245 mismatch
*Mar 1 00:30:50.171: ISAKMP (0:1): vendor ID is NAT-T v7
*Mar 1 00:30:50.171: ISAKMP: Looking for a matching key for 192.168.1.2 in default : success
*Mar 1 00:30:50.171: ISAKMP (0:1): found peer pre-shared key matching 192.168.1.2
*Mar 1 00:30:50.171: ISAKMP (0:1) local preshared key found
*Mar 1 00:30:50.171: ISAKMP : Scanning profiles for xauth ...
*Mar 1 00:30:50.175: ISAKMP (0:1): Checking ISAKMP transform 1 against priority 10 policy
//两个对等体交换了它们的IKE阶段1策略,路由器正在比较远程对等体的策略和本地策略10
*Mar 1 00:30:50.175: ISAKMP: encryption 3DES-CBC
*Mar 1 00:30:50.175: ISAKMP: hash SHA
*Mar 1 00:30:50.175: ISAKMP: default group 5
*Mar 1 00:30:50.175: ISAKMP: auth pre-share
*Mar 1 00:30:50.175: ISAKMP: life type in seconds
*Mar 1 00:30:50.175: ISAKMP: life duration (VPI) of 0x0 0x1 0x51 0x80
*Mar 1 00:30:50.179: ISAKMP (0:1): atts are acceptable. Next payload is 0
//策略已经匹配了,atts代表就可接受的,现在可以开始交换hiffice-hellman公开密钥值和临时值(随机数)
*Mar 1 00:30:50.271: ISAKMP (0:1): processing vendor id payload
*Mar 1 00:30:50.271: ISAKMP
R1# (0:1): vendor ID seems Unity/DPD but major 245 mismatch
*Mar 1 00:30:50.271: ISAKMP (0:1): vendor ID is NAT-T v7
*Mar 1 00:30:50.271: ISAKMP (0:1): Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
*Mar 1 00:30:50.275: ISAKMP (0:1): Old State = IKE_I_MM2 New State = IKE_I_MM2
*Mar 1 00:30:50.279: ISAKMP (0:1): sending packet to 192.168.1.2 my_port 500 peer_port 500 (I) MM_SA_SETUP
/R1将期diffie-hffie-hellman公开密钥值和临时值发送给R2
*Mar 1 00:30:50.279: ISAKMP (0:1): Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
*Mar 1 00:30:50.279: ISAKMP (0:1): Old State = IKE_I_MM2 New State = IKE_I_MM3
//发送了IKE协商中第三条消息
*Mar 1 00:30:50.459: ISAKMP (0:1): received packet from 192.168.1.2 dport 500 sport 500 Global (I) MM_SA_SETUP
//R1收到 了R2的响应
*Mar 1 00:30:50.463: ISAKMP (0:1): Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
*Mar 1 00:30:50.463: ISAKMP (0:1): Old State = IKE_I_MM3 New State = IKE_I_MM4
//状态变为第四条,表明该响应是主模式中的第四条消息。
*Mar 1 00:30:50.463: ISAKMP (0:1): processing KE payload. message ID = 0
*Mar 1 00:30:50.583: ISAKMP (0:1): processing NONCE payload. message ID = 0
*Mar
R1# 1 00:30:50.583: ISAKMP: Looking for a matching key for 192.168.1.2 in default : success
*Mar 1 00:30:50.587: ISAKMP (0:1): found peer pre-shared key matching 192.168.1.2
*Mar 1 00:30:50.591: ISAKMP (0:1): SKEYID state generated
//这里显示了skeyid sate generated 这表明tlkyo 已经生成了密资料
*Mar 1 00:30:50.591: ISAKMP (0:1): processing vendor id payload
*Mar 1 00:30:50.595: ISAKMP (0:1): vendor ID is Unity
*Mar 1 00:30:50.595: ISAKMP (0:1): processing vendor id payload
*Mar 1 00:30:50.595: ISAKMP (0:1): vendor ID is DPD
*Mar 1 00:30:50.595: ISAKMP (0:1): processing vendor id payload
*Mar 1 00:30:50.595: ISAKMP (0:1): speaking to another IOS box!
//显示了厂商ID有效负载,表明该消息来自另一台cisco路由器
*Mar 1 00:30:50.595: ISAKMP (0:1): Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
*Mar 1 00:30:50.595: ISAKMP (0:1): Old State = IKE_I_MM4 New State = IKE_I_MM4
*Mar 1 00:30:50.595: ISAKMP (0:1): Send initial contact
*Mar 1 00:30:50.595: ISAKMP (0:1): SA is doing pre-shared key authentication using id type ID_IPV4_ADDR
*Mar 1 00:30:50.595: ISAKMP (0:1): ID payload
next-
R1#payload : 8
type : 1
address : 192.168.1.1
protocol : 17
port : 500
length : 12
*Mar 1 00:30:50.595: ISAKMP (1): Total payload length: 12
*Mar 1 00:30:50.595: ISAKMP (0:1): sending packet to 192.168.1.2 my_port 500 peer_port 500 (I) MM_KEY_EXCH
*Mar 1 00:30:50.595: ISAKMP (0:1): Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
*Mar 1 00:30:50.595: ISAKMP (0:1): Old State = IKE_I_MM4 New State = IKE_I_MM5
//5条消息
*Mar 1 00:30:50.691: ISAKMP (0:1): received packet from 192.168.1.2 dport 500 sport 500 Global (I) MM_KEY_EXCH
*Mar 1 00:30:50.695: ISAKMP (0:1): processing ID payload. message ID = 0
*Mar 1 00:30:50.695: ISAKMP (0:1): ID payload
next-payload : 8
type : 1
address : 192.168.1.2
protocol : 17
port : 500
length : 12
*Mar 1 00:30:50.695: ISAKMP (0:1): processing HASH payload. message ID = 0
*Mar 1 00:30:50.699: ISAKMP (0:1): SA authentication status:
authenticated
*Mar 1
R1#00:30:50.699: ISAKMP (0:1): SA has been authenticated with 192.168.1.2
*Mar 1 00:30:50.699: ISAKMP (0:1): peer matches none of the profiles
*Mar 1 00:30:50.699: ISAKMP (0:1): Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
*Mar 1 00:30:50.703: ISAKMP (0:1): Old State = IKE_I_MM5 New State = IKE_I_MM6
*Mar 1 00:30:50.703: ISAKMP (0:1): Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE *Mar 1 00:30:50.703: ISAKMP (0:1): Old State = IKE_I_MM6 New State = IKE_I_MM6
*Mar 1 00:30:50.707: ISAKMP (0:1): Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
*Mar 1 00:30:50.707: ISAKMP (0:1): Old State = IKE_I_MM6 New State = IKE_P1_COMPLETE
//状态变为IKE_P1_COMPLETE,表明主模式(phase1)协商已经完成。
*Mar 1 00:30:50.711: ISAKMP (0:1): beginning Quick Mode exchange, M-ID of 174738581
//表明快速模式即将开始,R1即将发送的第一条快速模式消息ID(M——ID)不同于主模式中那些ID,这是一个非0值(随机)
*Mar 1 00:30:50.715: ISAKMP (0:1): sending packet to 192.168.1.2 my_port 500 peer_port 500 (I) QM_IDLE
//R1发送了快速模式协商中的第一第消息,该消息中包括ip sec提议
*Mar 1 00:30:50.715: ISAKMP (0:1): Node 174738581, Input = IKE_MESG_INTERNAL, IKE_INIT_QM
*Mar 1 00:30:50.719: ISAKMP (0:1): Old State = IKE_QM_R
R1#EADY New State = IKE_QM_I_QM1
//表明 IKE_QM_I_QM1第一第已发送
*Mar 1 00:30:50.719: ISAKMP (0:1): Input = IKE_MESG_INTERNAL, IKE_PHASE1_COMPLETE
*Mar 1 00:30:50.719: ISAKMP (0:1): Old State = IKE_P1_COMPLETE New State = IKE_P1_COMPLETE
*Mar 1 00:30:51.067: ISAKMP (0:1): received packet from 192.168.1.2 dport 500 sport 500 Global (I) QM_IDLE
//收到R2中回应,该消息包含了一系列的有效负载,其中包括了hash,sa,nonce,IE有效负载,
*Mar 1 00:30:51.071: ISAKMP (0:1): processing HASH payload. message ID = 174738581
//hash有效负载用于验证该消息及用作存活指示。
*Mar 1 00:30:51.075: ISAKMP (0:1): processing SA payload. message ID = 174738581
//sa有效负载包括ipsec提议
*Mar 1 00:30:51.075: ISAKMP (0:1): Checking IPSec proposal 1
*Mar 1 00:30:51.075: ISAKMP: transform 1, ESP_3DES
*Mar 1 00:30:51.075: ISAKMP: attributes in transform:
*Mar 1 00:30:51.075: ISAKMP: encaps is 1 (Tunnel)
*Mar 1 00:30:51.075: ISAKMP: SA life type in seconds
*Mar 1 00:30:51.075: ISAKMP: SA life duration (basic) of 3600
*Mar 1 00:30:51.075: ISAKMP: SA life type in kilobytes
R1#r 1 00:30:51.079: ISAKMP: SA life duration (VPI) of 0x0 0x46 0x50 0x0
*Mar 1 00:30:51.079: ISAKMP: authenticator is HMAC-MD5
*Mar 1 00:30:51.079: ISAKMP (0:1): atts are acceptable.
*Mar 1 00:30:51.079: IPSEC(validate_proposal_request): proposal part #1,
(key eng. msg.) INBOUND local= 192.168.1.1, remote= 192.168.1.2,
local_proxy= 1.1.1.1/255.255.255.255/1/0 (type=1),
remote_proxy= 2.2.2.2/255.255.255.255/1/0 (type=1),
protocol= ESP, transform= esp-3des esp-md5-hmac (Tunnel),
lifedur= 0s and 0kb,
spi= 0x0(0), conn_id= 0, keysize= 0, flags= 0x2
*Mar 1 00:30:51.083: IPSEC(kei_proxy): head = R1vpn, map->ivrf = , kei->ivrf =
*Mar 1 00:30:51.087: ISAKMP (0:1): processing NONCE payload. message ID = 174738581
*Mar 1 00:30:51.087: ISAKMP (0:1): processing ID payload. message ID = 174738581
*Mar 1 00:30:51.087: ISAKMP (0:1): processing ID payload. message ID = 174738581
*Mar 1 00:30:51.095: ISAKMP (0:1): Creating IPSec SAs
*Mar 1 00:30:51.095: inbound SA from 192.168.1.2 to 192.168.1.1 (f/i) 0/ 0
R1#
(proxy 2.2.2.2 to 1.1.1.1)
//这里创建了入站ipsec sa 该sa位于ip地址,192.168.1.2和192.168.1.1 之间,代理身份为2.2.2.2和1.1.1.1
*Mar 1 00:30:51.099: has spi 0xDE7C1239 and conn_id 2000 and flags 2
*Mar 1 00:30:51.099: lifetime of 3600 seconds
*Mar 1 00:30:51.099: lifetime of 4608000 kilobytes
*Mar 1 00:30:51.099: has client flags 0x0
*Mar 1 00:30:51.099: outbound SA from 192.168.1.1 to 192.168.1.2 (f/i) 0/ 0 (proxy 1.1.1.1 to 2.2.2.2 )
*Mar 1 00:30:51.099: has spi 1645135704 and conn_id 2001 and flags A
*Mar 1 00:30:51.099: lifetime of 3600 seconds
*Mar 1 00:30:51.103: lifetime of 4608000 kilobytes
*Mar 1 00:30:51.103: has client flags 0x0
*Mar 1 00:30:51.103: ISAKMP (0:1): sending packet to 192.168.1.2 my_port 500 peer_port 500 (I) QM_IDLE
//R1向R2发送快速模式协商中的最后一条消息,该消息用作确认在存活指示。
*Mar 1 00:30:51.103: ISAKMP (0:1): deleting node 174738581 error FALSE reason ""
*Mar 1 00:30:51.107: ISAKMP (0:1): Node 174738581, Input = IKE_MESG_FROM_PEER, IKE_QM_EXCH
*Mar 1 00:30:51.107: ISAKMP (0:1): Old
R1#State = IKE_QM_I_QM1 New State = IKE_QM_PHASE2_COMPLETE
//状态变为上示,表明phase2完成
*Mar 1 00:30:51.107: IPSEC(key_engine): got a queue event...
*Mar 1 00:30:51.107: IPSEC(initialize_sas): ,
(key eng. msg.) INBOUND local= 192.168.1.1, remote= 192.168.1.2,
local_proxy= 1.1.1.1/0.0.0.0/1/0 (type=1),
remote_proxy= 2.2.2.2/0.0.0.0/1/0 (type=1),
protocol= ESP, transform= esp-3des esp-md5-hmac (Tunnel),
lifedur= 3600s and 4608000kb,
spi= 0xDE7C1239(3732673081), conn_id= 2000, keysize= 0, flags= 0x2
*Mar 1 00:30:51.111: IPSEC(initialize_sas): ,
(key eng. msg.) OUTBOUND local= 192.168.1.1, remote= 192.168.1.2,
local_proxy= 1.1.1.1/0.0.0.0/1/0 (type=1),
remote_proxy= 2.2.2.2/0.0.0.0/1/0 (type=1),
protocol= ESP, transform= esp-3des esp-md5-hmac (Tunnel),
lifedur= 3600s and 4608000kb,
spi= 0x620EC758(1645135704), conn_id= 2001, keysize= 0, flags= 0xA
*Mar 1 00:30:51.115: IPSEC(kei_proxy): head = R1vpn, map->ivrf = , kei->ivrf =
*Mar 1 00:30:51.11
R1#5: IPSEC(crypto_ipsec_sa_find_ident_head): reconnecting with the same proxies and 192.168.1.2
*Mar 1 00:30:51.119: IPSEC(add mtree): src 1.1.1.1, dest 2.2.2.2, dest_port 0
*Mar 1 00:30:51.119: IPSEC(create_sa): sa created, (sa) sa_dest= 192.168.1.1, sa_prot= 50, sa_spi= 0xDE7C1239(3732673081), sa_trans= esp-3des esp-md5-hmac , sa_conn_id= 2000 *Mar 1 00:30:51.119: IPSEC(create_sa): sa created, (sa) sa_dest= 192.168.1.2, sa_prot= 50, sa_spi= 0x620EC758(1645135704), sa_trans= esp-3des esp-md5-hmac , sa_conn_id= 2001 R1#u all All possible debugging has been turned off R1#
第六步:其它测试 R1#sh crypto isakmp sa //查看关联 dst src state conn-id slot 192.168.1.2 192.168.1.1 QM_IDLE 1 0
R1#sh crypto ipsec sa //安全库 interface: Ethernet0/0 Crypto map tag: R1vpn, local addr. 192.168.1.1 //在e0/0上激活了R1vpn的加密映射,用于IPsec通信的路由器ip地址是192.168.1.1 protected vrf: local ident (addr/mask/prot/port): (1.1.1.1/255.255.255.255/1/0) remote ident (addr/mask/prot/port): (2.2.2.2/255.255.255.255/1/0) current_peer: 192.168.1.2:500 PERMIT, flags={origin_is_acl,} //这里显示了参与连接的对等体的本地和远程标识 #pkts encaps: 4, #pkts encrypt: 4, #pkts digest 4 #pkts decaps: 4, #pkts decrypt: 4, #pkts verify 4 #pkts compressed: 0, #pkts decompressed: 0 #pkts not compressed: 0, #pkts compr. failed: 0 #pkts not decompressed: 0, #pkts decompress failed: 0 #send errors 1, #recv errors 0 //这里可以看到被封装各加密的数据包数目 local crypto endpt.: 192.168.1.1, remote crypto endpt.: 192.168.1.2 path mtu 1500, ip mtu 1500, ip mtu idb Ethernet0/0 //IPsec连接的本地和远程端点,以及使用的MTU current outbound spi: 620EC758
inbound esp sas:
spi: 0xDE7C1239(3732673081)
//这里是输入(远程到本地路由器)esp sa,每个连接都有一个唯一的spi号 transform: esp-3des esp-md5-hmac , //用来保护连接的变换参数是esp-3des esp-md5-hmac in use settings ={Tunnel, } //连接模式是隧道模式 slot: 0, conn id: 2000, flow_id: 1, crypto map: R1vpn sa timing: remaining key lifetime (k/sec): (4532812/315) IV size: 8 bytes replay detection support: Y
inbound ah sas:
//AH下没有任何输出,说明ah没有用来保护连接 inbound pcp sas:
outbound esp sas:
spi: 0x620EC758(1645135704)
transform: esp-3des esp-md5-hmac ,
in use settings ={Tunnel, }
slot: 0, conn id: 2001, flow_id: 2, crypto map: R1vpn
sa timing: remaining key lifetime (k/sec): (4532812/314)
IV size: 8 bytes
replay detection support: Y
outbound ah sas:
outbound pcp sas:
Sh crypto enginee connections active //查看当前激活的连接。几个包加密,几个解密了