Considering General IPsec Issues
Before you configure IPsec, it is helpful to understand some general guidelines.
IPv4 and IPv6 traffic and tunnels—You can configure IPsec tunnels to carry traffic in the following ways: IPv4 traffic traveling over IPv4 IPsec tunnels, IPv6 traffic traveling over IPv4 IPsec tunnels, IPv4 traffic traveling over IPv6 IPsec tunnels, and IPv6 traffic traveling over IPv6 IPsec tunnels.
Configuration syntax differences between the AS and MultiServices PICs and the ES PIC—There are slight differences in the configuration statements and operational mode commands that are used with the PICs that support IPsec. As a result, the syntax for the AS and MultiServices PICs cannot be used interchangeably with the syntax for the ES PIC. However, the syntax for one type of PIC can be converted to its equivalent syntax on the other PIC for interoperability. The syntax differences are highlighted in Table 1.
Configuring keys for authentication and encryption—When preshared keys are required for authentication or encryption, you must use the guidelines shown in Table 2 to implement the correct key size.
Rejection of weak and semiweak keys—The DES and 3DES encryption algorithms will reject weak and semiweak keys. As a result, do not create and use keys that contain the patterns listed in Table 3.
AS and MultiServices PICs Statements and Commands |
ES PIC Statements and Commands |
---|---|
Configuration Mode Statements | |
|
– |
[edit services ipsec-vpn ike]
|
[edit security ike]
|
[edit services ipsec-vpn ipsec]
|
[edit security ipsec]
|
|
|
|
[edit security ipsec]
|
[edit services ipsec-vpn rule-set] |
– |
[edit services service-set ipsec-vpn]
|
|
Operational Mode Commands | |
clear security pki ca-certificate |
– |
clear security pki certificate-request |
– |
clear security pki local-certificate |
– |
clear services ipsec-vpn certificates |
– |
request security pki ca-certificate enroll |
request security certificate (unsigned) |
request security pki ca-certificate load |
request system certificate add |
request security pki generate-certificate-request |
– |
request security pki generate-key-pair |
request security key-pair |
request security pki local-certificate enroll |
request security certificate (signed) |
request security pki local-certificate load |
request system certificate add |
|
|
|
– |
|
– |
|
|
|
|
|
|
|
|
Number of Hexadecimal Characters |
Number of ASCII Characters |
|
---|---|---|
Authentication |
||
HMAC-MD5-96 |
32 |
16 |
HMAC-SHA1-96 |
40 |
20 |
Encryption |
||
AES-128-CBC |
16 |
32 |
AES-192-CBC |
24 |
48 |
AES-256-CBC |
32 |
64 |
DES-CBC |
16 |
8 |
3DES-CBC |
48 |
24 |
Weak Keys |
|||
---|---|---|---|
0101 |
0101 |
0101 |
0101 |
1F1F |
1F1F |
1F1F |
1F1F |
E0E0 |
E0E0 |
E0E0 |
E0E0 |
FEFE |
FEFE |
FEFE |
FEFE |
Semiweak Keys | |||
01FE |
01FE |
01FE |
01FE |
1FE0 |
1FE0 |
0EF1 |
0EF1 |
01E0 |
01E0 |
01F1 |
01F1 |
1FFE |
1FFE |
0EFE |
0EFE |
011F |
011F |
010E |
010E |
E0FE |
E0FE |
F1FE |
F1FE |
FE01 |
FE01 |
FE01 |
FE01 |
E01F |
E01F |
F10E |
F10E |
E001 |
E001 |
F101 |
F101 |
FEF1 |
FEF1 |
FE0E |
FE0E |
1F01 |
1F01 |
0E01 |
0E01 |
FEE0 |
FEE0 |
FEF1 |
FEF1 |
Keep in mind the following limitations of IPsec services on the AS PIC:
The AS PIC does not transport packets containing IPv4 options across IPsec tunnels. If you try to send packets containing IP options across an IPsec tunnel, the packets are dropped. Also, if you issue a
ping
command with the record-route option across an IPsec tunnel, theping
command fails.The AS PIC does not transport packets containing the following IPv6 options across IPsec tunnels: hop-by-hop, destination (Type 1 and 2), and routing. If you try to send packets containing these IPv6 options across an IPsec tunnel, the packets are dropped.
Destination class usage is not supported with IPsec services on the AS PIC.