[j-nsp] IKE Key Life-times on J-series vs. SRX
Devin Kennedy
devinkennedy415 at hotmail.com
Thu Jun 2 15:59:23 EDT 2011
Does anyone know if the lifetime value used for the IKE session is
determined by the initiator? It appears from the behavior I've observed
that the lifetime value is always determined by whichever peer is in the
initiator role.
-----Original Message-----
From: juniper-nsp-bounces at puck.nether.net
[mailto:juniper-nsp-bounces at puck.nether.net] On Behalf Of Devin Kennedy
Sent: Thursday, June 02, 2011 11:37 AM
To: juniper-nsp at puck.nether.net
Subject: [j-nsp] IKE Key Life-times on J-series vs. SRX
Hello All:
I am seeing a difference in behavior on the J4350 vs. the SRX240 for the IKE
key lifetime negotiation for IPsec phase 1. In both cases the peer is a
Cisco 1841. Please see outputs below. Has anyone else run into this? I
would expect that it ought to take the lower lifetime value as it does on
the SRX240.
BTW, Im running Junos 10.4R4.5 on both Juniper routers.
On the SRX I saw what I expected to see, which is that the negotiated value
is the lesser of the two if they do not match:
SRX240
[edit]
Devin at SRX240-1# show security ike proposal testikeprop
authentication-method pre-shared-keys;
dh-group group2;
authentication-algorithm sha1;
encryption-algorithm aes-256-cbc;
[edit]
Devin at SRX240-1# run show security ike security-associations detail
IKE peer 10.10.3.89, Index 7707821,
Role: Initiator, State: UP
Initiator cookie: ed10b684f40a71d2, Responder cookie: 3c2a1fb09e701c34
Exchange type: Main, Authentication method: Pre-shared-keys
Local: 10.10.3.93:500, Remote: 10.10.3.89:500
Lifetime: Expires in 28795 seconds
Peer ike-id: 10.10.3.89
Xauth assigned IP: 0.0.0.0
Algorithms:
Authentication : sha1
Encryption : aes-cbc (256 bits)
Pseudo random function: hmac-sha1
Traffic statistics:
Input bytes : 688
Output bytes : 880
Input packets: 4
Output packets: 5
Flags: Caller notification sent
IPSec security associations: 1 created, 0 deleted
Phase 2 negotiations in progress: 1
Negotiation type: Quick mode, Role: Initiator, Message ID: 1851437682
Local: 10.10.3.93:500, Remote: 10.10.3.89:500
Local identity: ipv4_subnet(any:0,[0..7]=10.100.9.0/24)
Remote identity: ipv4_subnet(any:0,[0..7]=10.100.7.0/24)
Flags: Caller notification sent, Waiting for done
Cisco 1841
crypto isakmp policy 1
encr aes 256
authentication pre-share
group 2
C1841-2#show crypto isakmp policy
Global IKE policy
Protection suite of priority 1
encryption algorithm: AES - Advanced Encryption Standard (256
bit keys).
hash algorithm: Secure Hash Standard
authentication method: Pre-Shared Key
Diffie-Hellman group: #2 (1024 bit)
lifetime: 86400 seconds, no volume limit
Default protection suite
encryption algorithm: DES - Data Encryption Standard (56 bit
keys).
hash algorithm: Secure Hash Standard
authentication method: Rivest-Shamir-Adleman Signature
Diffie-Hellman group: #1 (768 bit)
lifetime: 86400 seconds, no volume limit
C1841-2#show crypto isakmp sa detail
Codes: C - IKE configuration mode, D - Dead Peer Detection
K - Keepalives, N - NAT-traversal
X - IKE Extended Authentication
psk - Preshared key, rsig - RSA signature
renc - RSA encryption
IPv4 Crypto ISAKMP SA
C-id Local Remote I-VRF Status Encr Hash Auth DH
Lifetime Cap.
1156 10.10.3.89 10.10.3.93 ACTIVE aes sha psk 2 0
D
Engine-id:Conn-id = ???
(deleted)
1155 10.10.3.89 10.10.3.93 ACTIVE aes sha psk 2
07:59:34 D
Engine-id:Conn-id = SW:155
With the J4350 in place of the SRX240 with the same configuration as shown
for the SRX240 and same configuration as shown for the Cisco 1841, I see:
J4350
[edit]
Devin at J4350-1# show security ike proposal testikeprop ß No lifetime
configured so should use default of 28800
authentication-method pre-shared-keys;
dh-group group2;
authentication-algorithm sha1;
encryption-algorithm aes-256-cbc;
[edit]
Devin at J4350-1#
Devin at J4350-1> show security ike security-associations detail
IKE peer 10.10.3.89, Index 4833153,
Role: Responder, State: UP
Initiator cookie: b4443ecf19364ac2, Responder cookie: 7c741a4fcb0f5558
Exchange type: Main, Authentication method: Pre-shared-keys
Local: 10.10.3.85:500, Remote: 10.10.3.89:500
Lifetime: Expires in 86321 seconds
Peer ike-id: 10.10.3.89
Xauth assigned IP: 0.0.0.0
Algorithms:
Authentication : sha1
Encryption : aes-cbc (256 bits)
Pseudo random function: hmac-sha1
Traffic statistics:
Input bytes : 864
Output bytes : 1092
Input packets: 5
Output packets: 5
Flags: Caller notification sent
IPSec security associations: 1 created, 0 deleted
Phase 2 negotiations in progress: 1
Negotiation type: Quick mode, Role: Responder, Message ID: 931695683
Local: 10.10.3.85:500, Remote: 10.10.3.89:500
Local identity: ipv4_subnet(any:0,[0..7]=10.100.11.0/24)
Remote identity: ipv4_subnet(any:0,[0..7]=10.100.7.0/24)
Flags: Caller notification sent, Waiting for done
Cisco 1841
C1841-2#sho crypto isa sa det
Codes: C - IKE configuration mode, D - Dead Peer Detection
K - Keepalives, N - NAT-traversal
X - IKE Extended Authentication
psk - Preshared key, rsig - RSA signature
renc - RSA encryption
IPv4 Crypto ISAKMP SA
C-id Local Remote I-VRF Status Encr Hash Auth DH
Lifetime Cap.
0 10.10.3.89 10.10.3.85 ACTIVE aes sha psk 2 0
D
Engine-id:Conn-id = ???
1237 10.10.3.89 10.10.3.85 ACTIVE aes sha psk 2
23:59:19 D
Engine-id:Conn-id = SW:237
C1841-2#sho crypto isa pol
Global IKE policy
Protection suite of priority 1
encryption algorithm: AES - Advanced Encryption Standard (256
bit keys).
hash algorithm: Secure Hash Standard
authentication method: Pre-Shared Key
Diffie-Hellman group: #2 (1024 bit)
lifetime: 86400 seconds, no volume limit
Default protection suite
encryption algorithm: DES - Data Encryption Standard (56 bit
keys).
hash algorithm: Secure Hash Standard
authentication method: Rivest-Shamir-Adleman Signature
Diffie-Hellman group: #1 (768 bit)
lifetime: 86400 seconds, no volume limit
Thanks,
Devin
_______________________________________________
juniper-nsp mailing list juniper-nsp at puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp
More information about the juniper-nsp
mailing list