From: John Elias (jelias_@xxxxxxxxxxx)
Date: Sat Jun 02 2001 - 16:17:51 GMT-3
   
Dave,
Do a "show crypto engine connection active", I beleive this is the command.
Notice the output on the left before you ping, then ping and see if the
output incrimmented by five.
John
>From: David Anderson <dma@cisco.com>
>Reply-To: David Anderson <dma@cisco.com>
>To: ccielab@groupstudy.com
>Subject: IPsec question
>Date: Sat, 02 Jun 2001 10:59:58 -0700
>
>Hi all,
>I have a question about IPsec debug output.  I have the following debugs
>running on both the sending and receiving routers:
>debug crypto ipsec
>debug crypto isakmp
>debug ip packet
>
>When I ping from the source to the destination defined in my access-list, I
>get no debug output.    It looks like it is working, but I am just curios
>as to why I do not receive any debug output.  When I use the following show
>commands, this is what I get:....it is the same on the receiving
>router.  Any ideas?
>Thanks,
>David
>
>router1#sh crypto isakmp sa
>     dst           src          state        conn-id   slot
>1.1.1.1        6.6.6.6        QM_IDLE           2       0
>6.6.6.6        1.1.1.1        QM_IDLE           1       0
>
>
>router1#sh crypto map
>Crypto Map: "secret" idb: Loopback1 local address: 1.1.1.1
>
>Crypto Map "secret" 10 ipsec-isakmp
>         Peer = 6.6.6.6
>         Extended IP access list 101
>             access-list 101 permit ip host 1.1.1.1 host 6.6.6.6
>         Current peer: 6.6.6.6
>         Security association lifetime: 4608000 kilobytes/3600 seconds
>         PFS (Y/N): N
>         Transform sets={ TMA, }
>         Interfaces using crypto map secret:
>                 Serial1
>                 Tunnel0
>
>
>router1#sh crypto ipsec sa ?
>   address    IPSEC SA table in (dest) address order
>   detail     show counter detail
>   identity   IPSEC SADB identity tree
>   interface  Show info for specific interface
>   map        IPSEC SA table for a specific crypto map
>   |          Output modifiers
>   <cr>
>
>router1#sh crypto ipsec sa
>
>interface: Tunnel0
>     Crypto map tag: secret, local addr. 1.1.1.1
>
>    local  ident (addr/mask/prot/port): (1.1.1.1/255.255.255.255/0/0)
>    remote ident (addr/mask/prot/port): (6.6.6.6/255.255.255.255/0/0)
>    current_peer: 6.6.6.6
>      PERMIT, flags={origin_is_acl,}
>     #pkts encaps: 526, #pkts encrypt: 526, #pkts digest 0
>     #pkts decaps: 526, #pkts decrypt: 526, #pkts verify 0
>     #pkts compressed: 0, #pkts decompressed: 0
>     #pkts not compressed: 0, #pkts compr. failed: 0, #pkts decompress
>failed: 0
>     #send errors 2, #recv errors 0
>
>      local crypto endpt.: 1.1.1.1, remote crypto endpt.: 6.6.6.6
>      path mtu 1514, media mtu 1514
>      current outbound spi: 63023E0
>
>      inbound esp sas:
>       spi: 0x99A23FC(161096700)
>         transform: esp-des ,
>         in use settings ={Tunnel, }
>         slot: 0, conn id: 2004, flow_id: 5, crypto map: secret
>         sa timing: remaining key lifetime (k/sec): (4607982/1903)
>         IV size: 8 bytes
>         replay detection support: N
>
>      inbound ah sas:
>
>      inbound pcp sas:
>
>      outbound esp sas:
>       spi: 0x63023E0(103818208)
>         transform: esp-des ,
>         in use settings ={Tunnel, }
>         slot: 0, conn id: 2005, flow_id: 6, crypto map: secret
>         sa timing: remaining key lifetime (k/sec): (4607978/1894)
>         IV size: 8 bytes
>         replay detection support: N
>
>      outbound ah sas:
>
>      outbound pcp sas:
>
>
>
>interface: Serial1
>     Crypto map tag: secret, local addr. 1.1.1.1
>
>    local  ident (addr/mask/prot/port): (1.1.1.1/255.255.255.255/0/0)
>    remote ident (addr/mask/prot/port): (6.6.6.6/255.255.255.255/0/0)
>    current_peer: 6.6.6.6
>      PERMIT, flags={origin_is_acl,}
>     #pkts encaps: 527, #pkts encrypt: 527, #pkts digest 0
>     #pkts decaps: 527, #pkts decrypt: 527, #pkts verify 0
>     #pkts compressed: 0, #pkts decompressed: 0
>     #pkts not compressed: 0, #pkts compr. failed: 0, #pkts decompress
>failed: 0
>     #send errors 2, #recv errors 0
>
>      local crypto endpt.: 1.1.1.1, remote crypto endpt.: 6.6.6.6
>      path mtu 1514, media mtu 1514
>      current outbound spi: 63023E0
>
>      inbound esp sas:
>       spi: 0x99A23FC(161096700)
>         transform: esp-des ,
>         in use settings ={Tunnel, }
>         slot: 0, conn id: 2004, flow_id: 5, crypto map: secret
>         sa timing: remaining key lifetime (k/sec): (4607981/1894)
>         IV size: 8 bytes
>         replay detection support: N
>
>      inbound ah sas:
>
>      inbound pcp sas:
>
>      outbound esp sas:
>       spi: 0x63023E0(103818208)
>         transform: esp-des ,
>         in use settings ={Tunnel, }
>         slot: 0, conn id: 2005, flow_id: 6, crypto map: secret
>         sa timing: remaining key lifetime (k/sec): (4607978/1885)
>         IV size: 8 bytes
>         replay detection support: N
>
>      outbound ah sas:
>
>      outbound pcp sas:
>David Anderson
>Network Design Engineer
>Enterprise Solutions Architecture & Design
>(408) 853-5515
>dma@cisco.com
>       |          |
>  ..:|||||||:...:|||||||:..
>C I S C O S Y S T E M S
>**Please read:http://www.groupstudy.com/list/posting.html
This archive was generated by hypermail 2.1.4 : Thu Jun 13 2002 - 10:31:17 GMT-3