Verifying Security Policy Databases Compatibility - Cisco 9134 - MDS Multilayer Fabric Switch Troubleshooting Manual

Mds 9000 family
Hide thumbs Also See for 9134 - MDS Multilayer Fabric Switch:
Table of Contents

Advertisement

IPsec Issues
S e n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a c k - d o c @ c i s c o . c o m
Ensure that the security association (SA) lifetime settings in the show crypto map domain ipsec
Step 6
command outputs are large enough to avoid excessive re-keys (the default settings ensure this).
Step 7
Ensure that the crypto map set is applied to the correct interface in the show crypto map domain ipsec
command outputs for both switches.

Verifying Security Policy Databases Compatibility

To verify that the security policy databases (SPDs) are compatible on both switches, follow these steps:
Issue the show crypto spd domain ipsec command on both switches to display the SPD. The command
Step 1
outputs follow:
MDSA# show crypto spd domain ipsec
Policy Database for interface:GigabitEthernet7/1, direction:Both
#
#
#
# 127:
MDSC# show crypto spd domain ipsec
Policy Database for interface:GigabitEthernet1/2, direction:Both
#
#
#
# 127:
Step 2
Issue the show ipsec internal crypto-accelerator interface gigabitethernet slot/port spd inbound
command on both switches to display SPD information from the crypto-accelerator.
Note
To issue commands with the internal keyword, you must have an account that is a member of the
network-admin group.
The example command outputs follow:
MDSA# show ipsec internal crypto-accelerator interface gigabitethernet 7/1 spd inbound
Cisco MDS 9000 Family Troubleshooting Guide, Release 3.x
22-8
0:
deny
udp any port eq 500 any <-----------Clear test policies for IKE
1:
deny
udp any any port eq 500 <-----------Clear test policies for IKE
2:
permit ip 10.10.100.231 255.255.255.255 10.10.100.232 255.255.255.255
deny
ip any any <------------Clear test policy for all other traffic
0:
deny
udp any port eq 500 any
1:
deny
udp any any port eq 500
2:
permit ip 10.10.100.232 255.255.255.255 10.10.100.231 255.255.255.255
deny
ip any any
Inbound Policy 0 :
Source IP Address :*
Destination IP Address :*
Source port :500, Destination port :* Protocol UDP
Physical port:0/0, Vlan_id:0/0
Action cleartext
Inbound Policy 1 :
Source IP Address :*
Destination IP Address :*
Source port :*, Destination port :500 Protocol UDP
Physical port:0/0, Vlan_id:0/0
Action cleartext
Inbound Policy 2 :
Source IP Address :10.10.100.232/255.255.255.255
Destination IP Address :10.10.100.231/255.255.255.255
Source port :*, Destination port :* Protocol *
Physical port:0/1, Vlan_id:0/4095
Chapter 22
Troubleshooting IPsec
OL-9285-05

Hide quick links:

Advertisement

Table of Contents

Troubleshooting

loading

Table of Contents