VPN Gateway Device Configured as Responder in Crypto Negotiation Document ID: 113158 Contents Introduction Prerequisites Requirements Components Used Related Products Conventions Background Information Benefits of the IKE Responder−Only Mode Feature A Router to be configured as a Responder−Only device in a crypto negotiation An ASA to be configured as a Responder−Only device in a crypto negotiation Related Information Introduction This document provides information on how to configure a VPN gateway device to always act as a responder in an IKE negotiation. The device will respond to any crypto negotiations initiated by its peers. Prerequisites Requirements There are no specific requirements for this document. Components Used The information in this document is based on these software and hardware versions: • Cisco Router with Cisco IOS® Software Release 12.4(24)T and later • Cisco Adaptive Security Appliance (ASA) with version 7.0 and later Related Products This document can also be used with these hardware and software versions: • Cisco PIX Firewall with Software version 7.0 and later Conventions Refer to Cisco Technical Tips Conventions for more information on document conventions. Background Information Any crypto negotiation has two parties to play the Initiator and Responder roles. The initiator sends the crypto proposals to the responder which contains different parameters about the encryption, authentication algorithms, re−keying options and the life−time values and so forth. The responder chooses the right proposal and a crypto session establishes. The role played by an end−device can be viewed by this command output: Router#show crypto isakmp sa 1 IKE Peer: XX.XX.XX.XX Type : L2L Rekey : no Role State : initiator : MM_ACTIVE ASA(config)#show crypto isakmp sa detail IKE Peer Type Dir 1 209.165.200.225 User Rky State Encrypt Hash Resp No AM_Active 3des Auth SHA Benefits of the IKE Responder−Only Mode Feature Since the advent of virtual private network (VPN) features that allow simultaneous bidirectional IKE negotiations (with or without interesting traffic), issues with the handling and recovery of data from duplicate IKE SAs have occurred. IKE as a protocol has no ability to compare IKE negotiations to determine whether there is already an existing or in−process negotiation between two peers taking place. These duplicate negotiations can be costly in terms of resources and confusing to router administrators. When a device is configured as a responder−only device, it will not initiate IKE main, aggressive, or quick modes (for IKE and IPSec SA establishment), nor will it rekey IKE and IPSec SAs. Therefore, the likelihood of duplicate SAs is reduced. The other benefit of this feature is to allow controlled support for negotiating connections in one direction only in a load−balancing scenario. It is not recommended that the servers or hubs initiate VPN connections toward the clients or spokes because these devices are all being accessed by a single−facing IP address as advertised via the load balancer. If the hubs were to initiate the connection, they would be doing so using an individual IP address, thus circumventing the benefits of the load balancer. The same is true of rekeying requests that are sourced from the hubs or servers behind the load balancer. A Router to be configured as a Responder−Only device in a crypto negotiation Cisco IOS Software Release 12.4(24)T introduces the functionality of the router to always respond to the IKE negotiations initiated by its peers. The main limitation is that this feature is configurable only under an IPSec profile and is relevant only to a virtual interface scenario. No support for static or dynamic crypto map scenarios. In order to configure your router as responder−only, perform these steps: enable configure terminal crypto ipsec profile <name> responder−only An ASA to be configured as a Responder−Only device in a crypto negotiation In general IPSec LAN−to−LAN connections, the ASA can function as initiator or responder. In IPSec client−to−LAN connections, the ASA functions only as responder. An ASA can be configured as L pres respond−only device in LAN−to−LAN VPN connections. However, the restriction is that the device at the other end of the VPN tunnel must be one of these: • Cisco ASA 5500 series appliance • Cisco VPN 3000 series Concentrator • Cisco PIX 500 series firewall that runs 7.0 software and later In order to configure your ASA as responder−only device, issue this command: hostname(config)# crypto map mymap 10 set connection−type answer−only Note: It is suggested to configure a VPN gateway device as responder−only where multiple VPN peers terminate. Related Information • Configuring a Router−to−Router LAN−to−LAN Tunnel with a Router Initiating IKE Aggressive Mode • Cisco ASA Configuration Examples and TechNotes • Technical Support & Documentation − Cisco Systems Contacts & Feedback | Help | Site Map © 2014 − 2015 Cisco Systems, Inc. All rights reserved. Terms & Conditions | Privacy Statement | Cookie Policy | Trademarks of Cisco Systems, Inc. Updated: Aug 01, 2011 Document ID: 113158