The DES/3DES/AES VPN Encryption Module (AIM-VPN/EPII, AIM-VPN/HPII, AIM-VPN/BPII
Family) feature describes how to configure virtual private network (VPN) encryption hardware advanced
integration modules (AIM) and network modules (NM) in Cisco IOS Release 12.3(7)T.
Feature Specifications for the VPN Encryption Module
Feature History
ReleaseModification
12.2(13)TThis feature was introduced on the Cisco 2691, Cisco 3660, Cisco 3725,
and Cisco 3745.
12.2(15)ZJThis feature was introduced on the AIM-VPN/BPII on the following
platforms: Cisco 2610XM, Cisco 2611XM, Cisco 2620XM,
Cisco 2621XM, Cisco 2650XM, and Cisco 2651XM.
12.3(4)TThis feature was integrated into Cisco IOS Release 12.3(4)T.
12.3(5)This feature was revised to include support for the AIM-VPN/EPII,
AIM-VPN/HPII family of encryption modules and was integrated into
Cisco IOS Release 12.3(5).
12.3(6)This feature was revised to include support for the AIM-VPN/BPII-Plus on
the 2600XM encryption modules and was integrated into Cisco IOS
Release 12.3(6).
12.3(7)TThis feature was revised to include support for the AIM-VPN/BPII-Plus
family of encryption modules and was integrated into Cisco IOS Release
12.3(7)T.
Finding Support Information for Platforms and Cisco IOS Software Images
Use Cisco Feature Navigator to find information about platform support and Cisco IOS software image
support. Access Cisco Feature Navigator at http://www.cisco.com/go/fn. You must have an account on
Cisco.com. If you do not have an account or have forgotten your username or password, click Cancel at
the login dialog box and follow the instructions that appear.
Corporate Headquarters:
Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA 95134-1706 USA
Restrictions for DES/3DES/AES VPN Encryption Module
Table 1AIM/VPN Encryption Module Support by Cisco IOS Release
PlatformEncryption Module Support by Cisco IOS Release
12.2(13)T12.3(4)T12.3(5) 12.3(6) 12.3(7)T
Cisco 3725AIM-VPN/EPII Hardware Encryption
Module
Cisco 3660
Cisco 3745
AIM-VPN/HPII Hardware Encryption
Module
AIM-VPN/EPII-Plus Hardware Encryption Module
AIM-VPN/HPII-Plus Hardware Encryption Module
Restrictions for DES/3DES/AES VPN Encryption Module
• Rivest-Shamir-Adelman (RSA) manual keying is not supported.
• To achieve maximum benefit from hardware-assisted IP Payload Compression Protocol (IPPCP), it
is suggested that prefragmentation be disabled if IP compression with the Limpel Zif Stac (LZS)
algorithm is enabled on IP Security (IPSec) sessions.
How to Configure DES/3DES/AES VPN Encryption Module
There are no configuration tasks specific to the encryption hardware. Both software-based and
hardware-based encryption are configured in the same way. The system automatically detects the
presence of an encryption module at bootup and uses it to encrypt data. If no encryption hardware is
detected, software is used to encrypt data.
Additional References
The following sections provide additional references pertaining to VPN Encryption Modules.
Related Documents
Related TopicDocument Title
Installation of VPN encryption modulesInstalling Advanced Integration Modules in Cisco 2600 Series,
No new or modified standards are supported by this
feature, and support for existing standards has not been
modified by this feature.
—
MIBs
MIBsMIBs Link
No new or modified MIBs are supported by this
feature, and support for existing MIBs has not been
modified by this feature.
To locate and download MIBs for selected platforms, Cisco IOS
releases, and feature sets, use Cisco MIB Locator found at the
following URL:
http://www.cisco.com/go/mibs
RFCs
RFCsTitle
2401–2410IPSec AH, ESP
2401–2411IPsec/IKE
2401–2451IPsec/IKE
AES (NIST)Advanced Encryption Standard and The National Institute of
Standards and Technology
Technical Assistance
DescriptionLink
Technical Assistance Center (TAC) home page,
containing 30,000 pages of searchable technical
content, including links to products, technologies,
solutions, technical tips, and tools. Registered
Cisco.com users can log in from this page to access
even more content.
This section documents modified commands. All other commands used with this feature are documented
in the Cisco IOS Release 12.3 command reference publications.
To reset the statistical and error counters for a router’s hardware accelerator to zero, use the clear crypto
engine accelerator counter command in privileged EXEC mode.
clear crypto engine accelerator counter
Syntax DescriptionThis command has no arguments or keywords.
DefaultsNo default behavior or values
Command ModesPrivileged EXEC
Command History
ExamplesThe following example shows the router’s statistical and error counters being cleared to zero:
Related Commands
ReleaseModification
12.1(3)XL This command was introduced for the Cisco uBR905 cable access router.
12.2(2)XASupport was added for the Cisco uBR925 cable access router.
12.2(13)TThis command was integrated into Cisco IOS Release 12.2(13)T and
implemented for the AIM-VPN/EPII & AIM-VPN/HPII on the following
platforms: Cisco 2691, Cisco 3660, Cisco 3725, and Cisco 3745.
12.2(15)ZJThis command was implemented for the AIM-VPN/BPII on the following
platforms: Cisco 2610XM, Cisco 2611XM, Cisco 2620XM,
Cisco 2621XM, Cisco 2650XM, and Cisco 2651XM.
12.3(4)TThis command was integrated into Cisco IOS Release 12.3(4)T.
Router# clear crypto engine accelerator counter
Command Description
crypto ca Defines the parameters for the certification authority used for a
session.
crypto cisco Defines the encryption algorithms and other parameters for a
session.
crypto dynamic-map Creates a dynamic map crypto configuration for a session.
crypto engine accelerator Enables the use of the onboard hardware accelerator for IPSec
encryption.
crypto ipsecDefines the IPSec security associations and transformation sets.
crypto isakmp Enables and defines the IKE protocol and its parameters.
crypto keyGenerates and exchanges keys for a cryptographic session.
crypto mapCreates and modifies a crypto map for a session.
To enable a router’s onboard hardware accelerator for IPSec encryption, use the crypto engine
accelerator command in global configuration mode. To disable the use of the onboard hardware IPSec
accelerator, and thereby perform IPSec encryption/decryption in software, use the no form of this
command.
crypto engine accelerator
no crypto engine accelerator
Syntax DescriptionThis command has no arguments or keywords.
DefaultsThe hardware accelerator for IPSec encryption is enabled.
Command ModesGlobal configuration mode
Command History
ReleaseModification
12.1(3)TThis command was introduced for the Cisco 1700 series router and other
Cisco routers that support hardware accelerators for IPSec encryption.
12.1(3)XLSupport was added for the Cisco uBR905 cable access router.
12.2(2)XASupport was added for the Cisco uBR925 cable access router.
12.2(13)TThis command was integrated into Cisco IOS Release 12.2(13)T and
implemented for the AIM-VPN/EPII & AIM-VPN/HPII on the following
platforms: Cisco 2691, Cisco 3660, Cisco 3725, and Cisco 3745.
12.2(15)ZJThis command was implemented for the AIM-VPN/BPII on the following
platforms: Cisco 2610XM, Cisco 2611XM, Cisco 2620XM,
Cisco 2621XM, Cisco 2650XM, and Cisco 2651XM.
12.3(4)TThis command was integrated into Cisco IOS Release 12.3(4)T.
Usage GuidelinesThis command is not normally needed for typical operations because the router’s onboard hardware
accelerator for IPSec encryption is enabled by default. The hardware accelerator should not be disabled
except on instruction from Cisco TAC personnel.
ExamplesThe following example shows how to enable the router’s onboard hardware accelerator for IPSec
encryption. This operation is normally needed only after the accelerator has been disabled for testing or
debugging purposes.
Router(config)# no crypto engine accel
Warning! all current connections will be torn down.
Do you want to continue? [yes/no]:
briefDisplays a summary of the configuration information for the crypto engine.
configurationDisplays the version and configuration information for the crypto engine.
Command ModesPrivileged EXEC
Command History
ReleaseModification
11.2 This command was introduced on the Cisco 7200, RSP7000, and 7500
series routers.
12.2(15)ZJThis command was implemented for the AIM-VPN/BPII on the following
platforms: Cisco 2610XM, Cisco 2611XM, Cisco 2620XM,
Cisco 2621XM, Cisco 2650XM, and Cisco 2651XM.
12.3(4)TThis command was integrated into Cisco IOS Release 12.3(4)T.
Usage GuidelinesThis command displays all crypto engines and displays the AIM-VPN product name.
ExamplesThe following example of show crypto engine brief shows typical crypto engine information:
To display the statistics and error counters for a router’s onboard hardware accelerator for IPSec
encryption, use the show crypto engine accelerator statistic command in privileged EXEC mode.
show crypto engine accelerator statistic
Syntax DescriptionThis command has no arguments or keywords.
Command ModesPrivileged EXEC
Command History
ReleaseModification
12.1(1)XCThis command was introduced for the Cisco 1700 series router and other
Cisco routers that support hardware accelerators for IPSec encryption.
12.1(3)XLThis command was introduced for the Cisco uBR905 cable access router.
12.2(2)XASupport was added for the Cisco uBR925 cable access router.
12.2(13)TThis command was integrated into Cisco IOS Release 12.2(13)T and
implemented for the AIM-VPN/EPII & AIM-VPN/HPII on the following
platforms: Cisco 2691, Cisco 3660, Cisco 3725, and Cisco 3745.
12.2(15)ZJThis command was implemented for the AIM-VPN/BPII on the following
platforms: Cisco 2610XM, Cisco 2611XM, Cisco 2620XM,
Cisco 2621XM, Cisco 2650XM, and Cisco 2651XM.
12.3(4)TThis command was integrated into Cisco IOS Release 12.3(4)T.
ExamplesThe following example shows typical output of the current statistics and error counters for the router’s
hardware accelerator:
Router# show crypto engine accelerator statistics
Virtual Private Network (VPN) Module in slot :0
Statistics for Hardware VPN Module since the last clear
of counters 1379 seconds ago
167874 packets in 167874 packets out
201596210 bytes in 201596059 bytes out
121 paks/sec in 121 paks/sec out
1169 Kbits/sec in 1169 Kbits/sec out
0 packets decrypted 0 packets encrypted
0 bytes before decrypt 0 bytes encrypted
0 bytes decrypted 0 bytes after encrypt
0 packets decompressed 0 packets compressed
0 bytes before decomp 0 bytes before comp
0 bytes after decomp 0 bytes after comp
0 packets bypass decompr 0 packets bypass compres
0 bytes bypass decompres 0 bytes bypass compressi
0 packets not decompress 0 packets not compressed
0 bytes not decompressed 0 bytes not compressed
1.0:1 compression ratio 1.0:1 overall
20 commands out 20 commands acknowledged
Last 5 minutes:
46121 packets in 46121 packets out
153 paks/sec in 153 paks/sec out
1667834 Kbits/sec in 1667836 Kbits/sec out
0 bytes decrypted 0 bytes encrypted
0 Kbits/sec decrypted 0 Kbits/sec encrypted
1.0:1 compression ratio 1.0:1 overall
Errors:
ppq full errors : 0 ppq rx errors : 0
cmdq full errors : 0 cmdq rx errors : 0
no buffer : 0 replay errors : 0
dest overflow : 0 authentication errors : 0
Out of memory : 0 Access denied : 0
Out of handles : 0 Bad function code : 0
Invalid parameter : 0 Bad handle value : 0
Output buffer overrun : 0 Input Underrun : 0
Input Overrun : 0 Invalid Key : 0
Invalid Packet : 0 Decrypt Failure : 0
Verification Fail : 0 Bad Attribute : 0
Invalid attrribute val: 0 Missing attribute : 0
Unwrappable object : 0 Hash Miscompare : 0
DF Bit set : 0 RNG self test fail : 0
Other error : 0
sessions : 0
compression algorithm on the originating router due to expansion.
were too short.
bypass decompresion counter.
not compressed counter.
compression algorithm that were successfully compressed or
decompressed. This statistic measures the efficiency of the
algorithm for all packets that were compressed or decompressed.
compression algorithm including those that were not compressed.
This measures the compression efficiency of all packets on the
tunnel.
card.
The following example shows typical output of the Cisco 2600 and Cisco 3600 VPN Modules. Note the
current statistics, error counters, and associated error numbers that may be returned to the console:
To display the contents and status of the control command, transmit packet, and receive packet rings used
by the hardware accelerator crypto engine, use the show crypto engine accelerator ring command in
privileged EXEC mode.
show crypto engine accelerator ring [control | packet | pool]
show crypto engine accelerator ring
Syntax Description
control (Optional) Displays the number of control commands that are queued for
packet(Optional) Displays the contents and status information for the transmit
pool(Optional) Displays the contents and status information for the receive
Command ModesPrivileged EXEC
Command History
ReleaseModification
12.1(3)XLThis command was introduced for the Cisco uBR905 cable access router.
12.2(2)XASupport was added for the Cisco uBR925 cable access router.
12.2(13)TThis command was integrated into Cisco IOS Release 12.2(13)T and
12.2(15)ZJThis command was implemented for the AIM-VPN/BPII on the following
12.3(4)TThis command was integrated into Cisco IOS Release 12.3(4)T.
execution by the hardware accelerator crypto engine.
packet rings that are used by the hardware accelerator crypto engine.
packet rings that are used by the hardware accelerator crypto engine.
implemented for the AIM-VPN/EPII & AIM-VPN/HPII on the following
platforms: Cisco 2691, Cisco 3660, Cisco 3725, and Cisco 3745.
Usage GuidelinesThis command displays information for the electronically erasable programmable read-only memory
(EEPROM), the motherboard, and the WAN interface cards (WICs), voice interface cards (VICs), and,
advanced integration modules (AIMs). Use this command to determine the type of port adapter installed
on a Versatile Interface Processor (VIP2) in your router.
ExamplesThe following example show how to obtain hardware information about an installed AIM-VPN.
Router# show diag 0
Encryption AIM 1:
Hardware Revision :1.0
Top Assy. Part Number :800-03700-01
Board Revision :A0
Deviation Number :0-0
Fab Version :02
PCB Serial Number :JAB9801ABCD
RMA Test History :00
RMA Number :0-0-0-0
RMA History :00
EEPROM format version 4