![]() |
Table Of Contents
DES/3DES/AES VPN Encryption Module (AIM-VPN/SSL-1, AIM-VPN/SSL-2, and AIM-VPN/SSL-3)
Determining Which Encryption Module to Use
Disabling an AIM Encryption Module on a Specific Slot
Reenabling an AIM Encryption Module on a Specific Slot
Clearing the Statistical and Error Counters
Verifying AIM-VPN/SSL-1, AIM-VPN/SSL-2, and AIM-VPN/SSL-3
Encryption Informationshow crypto engine accelerator statistic
DES/3DES/AES VPN Encryption Module (AIM-VPN/SSL-1, AIM-VPN/SSL-2, and AIM-VPN/SSL-3)
First Published: June 19, 2006Last Updated: May 30, 2006
The DES/3DES/AES VPN Encryption Module (AIM-VPN/SSL-1, AIM-VPN/SSL-2, and AIM-VPN/SSL-3) feature describes how to configure virtual private network (VPN) encryption hardware advanced integration modules (AIM) in Cisco IOS Release 12.4(9)T.
Finding Feature Information in This Module
Your Cisco IOS software release may not support all of the features documented in this module. To reach links to specific feature documentation in this module and to see a list of the releases in which each feature is supported, use the "Feature Information for DES/3DES/AES VPN Encrytion Module (AIM-VPN/SSL-1, AIM-VPN/SSL-2, and AIM-VPN/SSL-3)" section.
Finding Support Information for Platforms and Cisco IOS Software Images
Use Cisco Feature Navigator to find information about platform support and Cisco IOS software image support. Access Cisco Feature Navigator at http://www.cisco.com/go/fn. You must have an account on Cisco.com. If you do not have an account or have forgotten your username or password, click Cancel at the login dialog box and follow the instructions that appear.
Contents
Prerequisites for the DES/3DES/AES VPN Encryption Module (AIM-VPN/SSL-1, AIM-VPN/SSL-2, and AIM-VPN/SSL-3)
Installation Preconditions
•
Cisco IOS software Release 12.4(9)T
Note
See Table 1 for AIM-VPN/SSL-1, AIM-VPN/SSL-2, and AIM-VPN/SSL-3 encryption module support by Cisco IOS release.
•
A working IP network
For more information about configuring IP, see the Cisco IOS IP configuration guides, Release 12.4, which may be accessed at Cisco IOS Software Releases 12.4 Mainline Configuration Guides.
Restrictions for the DES/3DES/AES VPN Encryption Module (AIM-VPN/SSL-1, AIM-VPN/SSL-2, and AIM-VPN/SSL-3)
•
Rivest, Shamir, and Adelman (RSA) encryption supports only 512, 1024, 1536, and 2048 bit keys.
•
To achieve maximum benefit from hardware-assisted IP Payload Compression Protocol (IPPCP), it is suggested that prefragmentation be disabled if IP compression with the Limpel Zif Stac (LZS) algorithm is enabled on IP Security (IPsec) sessions.
•
Hardware acceleration is supported only for clients that are connecting to an SSL VPN gateway using SSL2.0 or SSL3.0 protocols when the rc4-md5 encryption transform is configured on the SSL VPN gateway. If aes-sha1 or 3des-sha1 encryption transforms are used, those protocols are processed on the router by the Cisco IOS software. SSL VPN clients should be configured for version 1.0 of the Transport Layer Security (TLS) protocol if you are using an encryption algorithm other than rc4-md5.
Information About the DES/3DES/AES VPN Encryption Module (AIM-VPN/SSL-1, AIM-VPN/SSL-2, and AIM-VPN/SSL-3)
Before using the DES/3DES/AES VPN Encryption Module (AIM-VPN/SSL-1, AIM-VPN/SSL-2, and AIM-VPN/SSL-3), you should be familiar with the following concept:
•
Determining Which Encryption Module to Use
Determining Which Encryption Module to Use
Determine which VPN encryption module to use as described in Table 1.
How to Configure the DES/3DES/AES VPN Encryption Module (AIM-VPN/SSL-1, AIM-VPN/SSL-2, and AIM-VPN/SSL-3)
There are no configuration tasks that are specific to the encryption hardware. Both software-based and hardware-based encryption are configured in the same way. The system automatically detects the presence of the encryption hardware at bootup and uses it to encrypt data. If no encryption hardware is detected, software is used to encrypt data.
This section includes the following procedures:
•
Disabling an AIM Encryption Module on a Specific Slot
•
Reenabling an AIM Encryption Module on a Specific Slot
•
Clearing the Statistical and Error Counters
•
Verifying AIM-VPN/SSL-1, AIM-VPN/SSL-2, and AIM-VPN/SSL-3 Encryption Information
Disabling an AIM Encryption Module on a Specific Slot
To disable an AIM encryption module on a specific slot, perform the following steps.
SUMMARY STEPS
1.
enable
2.
configure terminal
3.
no crypto engine aim aim-slot-number
DETAILED STEPS
Reenabling an AIM Encryption Module on a Specific Slot
To reenable an AIM encryption module on a specific slot, perform the following steps.
SUMMARY STEPS
1.
enable
2.
configure terminal
3.
crypto engine aim aim-slot-number
DETAILED STEPS
Clearing the Statistical and Error Counters
To clear the statistical and error counters of the hardware accelerator of a router, perform the following steps.
SUMMARY STEPS
1.
enable
2.
clear crypto engine accelerator counter
DETAILED STEPS
Verifying AIM-VPN/SSL-1, AIM-VPN/SSL-2, and AIM-VPN/SSL-3
Encryption InformationTo verify AIM-VPN encryption information, perform the following steps.
SUMMARY STEPS
1.
enable
2.
show crypto engine brief
3.
show crypto engine accelerator statistic
DETAILED STEPS
Additional References
The following sections provide references related to DES/3DES/AES VPN Encryption Module (AIM-VPN/SSL-1, AIM-VPN/SSL-2, and AIM-VPN/SSL-3).
Related Documents
Related Topic Document TitleInstallation of VPN encryption modules
•
Installing and Upgrading Internal Modules in Cisco 1800 Series Routers (Modular)
•
Installing and Upgrading Internal Modules in Cisco 2800 Series Routers
•
Installing and Upgrading Internal Components in Cisco 3800 Series Routers
Cisco 1800 series, Cisco 2600 series, Cisco 2800 series, Cisco 3700 series, and Cisco 3800 series routers
•
Cisco 1800 Series Integrated Service Routers
•
Cisco 2600 Series Multiservice Platforms
•
Cisco 2800 Series Integrated Service Routers
•
Cisco 3700 Series Multiservice Access Routers
Cisco IOS references
•
Cisco IOS Security Configuration Guide, Release 12.4
Standards
Standard TitleNo new or modified standards are supported by this feature, and support for existing standards has not been modified by this feature.
—
MIBs
RFCs
RFC TitleNo new or modified RFCs are supported by this feature, and support for existing RFCs has not been modified by this feature.
—
Technical Assistance
Command Reference
This section documents new and modified commands only.
Modified Commands
•
show crypto engine accelerator statistic
New Commands
Commands that may be used with this feature but are not modified in this release
For information about commands, see the Cisco IOS Security Command Reference (a link is provided in the "Related Documents" subsection of the Additional References section above).
•
crypto engine accelerator
crypto engine aim
To reenable an advanced integration module (AIM) encryption module, use the crypto engine aim command in global configuration mode. To disable an AIM encryption module, use the no form of this command.
crypto engine aim aim-slot-number
no crypto engine aim aim-slot-number
Syntax Description
Defaults
An AIM module is not reenabled or disabled.
Command Modes
Global configuration
Command History
Examples
The following example shows that the AIM module in slot 0 is to be reenabled:
crypto engine aim 0The following example shows that the AIM module in slot 0 is to be disabled:
no crypto engine aim 0show crypto engine
To display a summary of the configuration information for the crypto engines, use the
show crypto engine command in privileged EXEC mode.show crypto engine [accelerator | brief | configuration | connections | qos]
Syntax Description
Command Modes
Privileged EXEC
Command History
Usage Guidelines
This command displays all crypto engines and displays the AIM-VPN product name.
Examples
The following example of the show crypto engine command and the brief keyword shows typical crypto engine summary information:
Router# show crypto engine briefcrypto engine name: Virtual Private Network (VPN) Modulecrypto engine type: hardwareState: EnabledLocation: aim 0VPN Module in slot: 0Product Name: AIM-VPN/SSL-3Software Serial #: 55AADevice ID: 001F - revision 0000Vendor ID: 0000Revision No: 0x001F0000VSK revision: 0Boot version: 255DPU version: 0HSP version: 3.3(18) (PRODUCTION)Time running: 23:39:30Compression: YesDES: Yes3 DES: YesAES CBC: Yes (128,192,256)AES CNTR: NoMaximum buffer length: 4096Maximum DH index: 3500Maximum SA index: 3500Maximum Flow index: 7000Maximum RSA key size: 2048crypto engine name: Cisco VPN Software Implementationcrypto engine type: softwareserial number: CAD4FCE1crypto engine state: installedcrypto engine in slot: N/AThe following example of the show crypto engine command shows IPv6 information:
Router# show crypto engine connections
ID Interface Type Algorithm Encrypt Decrypt IP-Address1 Et2/0 IPsec MD5 0 46 FE80::A8BB:CCFF:FE01:2C022 Et2/0 IPsec MD5 41 0 FE80::A8BB:CCFF:FE01:2C025 Tu0 IPsec SHA+DES 0 0 3FFE:2002::A8BB:CCFF:FE01:2C026 Tu0 IPsec SHA+DES 0 0 3FFE:2002::A8BB:CCFF:FE01:2C021001 Tu0 IKE SHA+DES 0 0 3FFE:2002::A8BB:CCFF:FE01:2C02Table 1 describes significant fields shown in the display.
Related Commands
Command Descriptioncrypto engine accelerator
Enables the use of the onboard hardware accelerator for IPSec encryption.
show crypto engine accelerator statistic
To display IP Security (IPsec) encryption statistics and error counters for the onboard hardware accelerator of the router or the IPsec Virtual Private Network (VPN) Shared Port Adapter (SPA), use the show crypto engine accelerator statistic command in privileged EXEC mode.
show crypto engine accelerator statistic
IPsec VPN SPA
show crypto engine accelerator statistic [slot slot/subslot | all] [detail]
Syntax Description
Command Modes
Privileged EXEC
Command History
Usage Guidelines
No specific usage guidelines apply to the hardware accelerators.
IPsec VPN SPA
Enter the slot keyword to display platform statistics for the corresponding IPSec VPN SPA. This output will not include network interface controller statistics.
Enter the all keyword to display platform statistics for all IPSec VPN SPAs on the router. This output will not include network interface controller statistics.
Enter the detail keyword to display platform statistics for the IPSec VPN SPA and network interface controller statistics. Note that the controller statistics contain L2 counters.
Examples
Hardware VPN Module
The following example displays compression statistics for a hardware VPN module:
Router# show crypto engine accelerator statisticDevice: AIM-VPN/SSL-3Location: AIM Slot: 0Virtual Private Network (VPN) Module in slot : 0Statistics for Hardware VPN Module since the last clearof counters 85319 seconds ago560 packets in 560 packets out95600 bytes in 124720 bytes out0 paks/sec in 0 paks/sec out0 Kbits/sec in 0 Kbits/sec out0 packets decrypted 560 packets encrypted0 bytes before decrypt 124720 bytes encrypted0 bytes decrypted 95600 bytes after encrypt0 packets decompressed 0 packets compressed0 bytes before decomp 0 bytes before comp0 bytes after decomp 0 bytes after comp0 packets bypass decompr 0 packets bypass compres0 bytes bypass decompres 0 bytes bypass compressi0 packets not decompress 0 packets not compressed0 bytes not decompressed 0 bytes not compressed1.0:1 compression ratio 1.0:1 overall10426 commands out 10426 commands acknowledgedLast 5 minutes:0 packets in 0 packets out0 paks/sec in 0 paks/sec out0 bits/sec in 0 bits/sec out0 bytes decrypted 0 bytes encrypted0 Kbits/sec decrypted 0 Kbits/sec encrypted1.0:1 compression ratio 1.0:1 overallErrors:ppq full errors : 0 ppq rx errors : 0cmdq full errors : 0 cmdq rx errors : 0ppq down errors : 0 cmdq down errors : 0no buffer : 0 replay errors : 0dest overflow : 0 authentication errors : 0Other error : 0 Raw Input Underrun : 0IPSEC Unsupported Option: 0 IPV4 Header Length : 0ESP Pad Length : 0 IPSEC Decompression : 0AH ESP seq mismatch : 0 AH Header Length : 0AH ICV Incorrect : 0 IPCOMP CPI Mismatch : 0IPSEC ESP Modulo : 0 Unexpected IPV6 Extensio: 0Unexpected Protocol : 0 Dest Buf overflow : 0IPSEC Pkt is fragment : 0 IPSEC Pkt src count : 0Invalid IP Version : 0 Unwrappable : 0SSL Output overrun : 0 SSL Decompress failure : 0SSL BAD Decomp History : 0 SSL Version Mismatch : 0SSL Input overrun : 0 SSL Conn Modulo : 0SSL Input Underrun : 0 SSL Connection closed : 0SSL Unrecognised content: 0 SSL record header length: 0PPTP Duplicate packet : 0 PPTP Exceed max missed p: 0RNG self test fail : 0 DF Bit set : 0Hash Miscompare : 0 Unwrappable object : 0Missing attribute : 0 Invalid attrribute value: 0Bad Attribute : 0 Verification Fail : 0Decrypt Failure : 0 Invalid Packet : 0Invalid Key : 0 Input Overrun : 0Input Underrun : 0 Output buffer overrun : 0Bad handle value : 0 Invalid parameter : 0Bad function code : 0 Out of handles : 0Access denied : 0 Out of memory : 0NR overflow : 0 pkts dropped : 0Warnings:sessions_expired : 0 packets_fragmented : 0general: : 0HSP details:hsp_operations : 10441 hsp_sessions : 1
Tip
In Cisco IOS Release 12.2(8)T and later releases, you can add a time stamp to show commands using the exec prompt timestamp command in line configuration mode.
IPsec VPN SPA
The following example shows the platform statistics for the IPSec VPN SPA in slot 1 subslot 0 and also displays the network interface controller statistics:
Router# show crypto engine accelerator statistic slot 1/0 detailVPN module in slot 1/0Decryption Side Data Path Statistics====================================Packets RX...............: 454260Packets TX...............: 452480IPSec Transport Mode.....: 0IPSec Tunnel Mode........: 452470AH Packets...............: 0ESP Packets..............: 452470GRE Decapsulations.......: 0NAT-T Decapsulations.....: 0Clear....................: 8ICMP.....................: 0Packets Drop.............: 193Authentication Errors....: 0Decryption Errors........: 0Replay Check Failed......: 0Policy Check Failed......: 0Illegal CLear Packet.....: 0GRE Errors...............: 0SPD Errors...............: 0HA Standby Drop..........: 0Hard Life Drop...........: 0Invalid SA...............: 191SPI No Match.............: 0Destination No Match.....: 0Protocol No Match........: 0Reassembly Frag RX.......: 0IPSec Fragments..........: 0IPSec Reasm Done.........: 0Clear Fragments..........: 0Clear Reasm Done.........: 0Datagrams Drop...........: 0Fragments Drop...........: 0Decryption Side Controller Statistics=====================================Frames RX................: 756088Bytes RX.................: 63535848Mcast/Bcast Frames RX....: 2341RX Less 128Bytes.........: 756025RX Less 512Bytes.........: 58RX Less 1KBytes..........: 2RX Less 9KBytes..........: 3RX Frames Drop...........: 0Frames TX................: 452365Bytes TX.................: 38001544Mcast/Bcast Frames TX....: 9TX Less 128Bytes.........: 452343TX Less 512Bytes.........: 22TX Less 1KBytes..........: 0TX Less 9KBytes..........: 0Encryption Side Data Path Statistics====================================Packets RX...............: 756344Packets TX...............: 753880IPSec Transport Mode.....: 0IPSec Tunnel Mode........: 753869GRE Encapsulations.......: 0NAT-T Encapsulations.....: 0LAF prefragmented........: 0Fragmented...............: 0Clear....................: 753904ICMP.....................: 0Packets Drop.............: 123IKE/TED Drop.............: 27Authentication Errors....: 0Encryption Errors........: 0HA Standby Drop..........: 0Hard Life Drop...........: 0Invalid SA...............: 191Reassembly Frag RX.......: 0Clear Fragments..........: 0Clear Reasm Done.........: 0Datagrams Drop...........: 0Fragments Drop...........: 0Encryption Side Controller Statistics=====================================Frames RX................: 454065Bytes RX.................: 6168274/Mcast/Bcast Frames RX....: 1586RX Less 128Bytes.........: 1562RX Less 512Bytes.........: 452503RX Less 1KBytes..........: 0RX Less 9KBytes..........: 0RX Frames Drop...........: 0Frames TX................: 753558Bytes TX.................: 100977246Mcast/Bcast Frames TX....: 2TX Less 128Bytes.........: 3TX Less 512Bytes.........: 753555TX Less 1KBytes..........: 0TX Less 9KBytes..........: 0Table 4 describes significant fields shown in the display.
Related Commands
Feature Information for DES/3DES/AES VPN Encrytion Module (AIM-VPN/SSL-1, AIM-VPN/SSL-2, and AIM-VPN/SSL-3)
Table 5 lists the release history for this feature.
Not all commands may be available in your Cisco IOS software release. For release information about a specific command, see the command reference documentation.
Cisco IOS software images are specific to a Cisco IOS software release, a feature set, and a platform. Use Cisco Feature Navigator to find information about platform support and Cisco IOS software image support. Access Cisco Feature Navigator at http://www.cisco.com/go/fn. You must have an account on Cisco.com. If you do not have an account or have forgotten your username or password, click Cancel at the login dialog box and follow the instructions that appear.
Note
Table 5 lists only the Cisco IOS software release that introduced support for a given feature in a given Cisco IOS software release train. Unless noted otherwise, subsequent releases of that Cisco IOS software release train also support that feature.
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental.
Copyright © 2006 Cisco Systems, Inc. All rights reserved.