The DES/3DES/AES VPN Encryption Module (AIM-VPN/EPII, AIM-VPN/HPII, AIM-VPN/BPII
Family) feature describes how to configure virtual private network (VPN) encryption hardware advanced
integration modules (AIM) and network modules (NM) in Cisco IOS Release 12.3(7)T.
Feature Specifications for the VPN Encryption Module
Feature History
ReleaseModification
12.2(13)TThis feature was introduced on the Cisco 2691, Cisco 3660, Cisco 3725,
and Cisco 3745.
12.2(15)ZJThis feature was introduced on the AIM-VPN/BPII on the following
platforms: Cisco 2610XM, Cisco 2611XM, Cisco 2620XM,
Cisco 2621XM, Cisco 2650XM, and Cisco 2651XM.
12.3(4)TThis feature was integrated into Cisco IOS Release 12.3(4)T.
12.3(5)This feature was revised to include support for the AIM-VPN/EPII,
AIM-VPN/HPII family of encryption modules and was integrated into
Cisco IOS Release 12.3(5).
12.3(6)This feature was revised to include support for the AIM-VPN/BPII-Plus on
the 2600XM encryption modules and was integrated into Cisco IOS
Release 12.3(6).
12.3(7)TThis feature was revised to include support for the AIM-VPN/BPII-Plus
family of encryption modules and was integrated into Cisco IOS Release
12.3(7)T.
Finding Support Information for Platforms and Cisco IOS Software Images
Use Cisco Feature Navigator to find information about platform support and Cisco IOS software image
support. Access Cisco Feature Navigator at http://www.cisco.com/go/fn. You must have an account on
Cisco.com. If you do not have an account or have forgotten your username or password, click Cancel at
the login dialog box and follow the instructions that appear.
Corporate Headquarters:
Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA 95134-1706 USA
Restrictions for DES/3DES/AES VPN Encryption Module
Table 1AIM/VPN Encryption Module Support by Cisco IOS Release
PlatformEncryption Module Support by Cisco IOS Release
12.2(13)T12.3(4)T12.3(5) 12.3(6) 12.3(7)T
Cisco 3725AIM-VPN/EPII Hardware Encryption
Module
Cisco 3660
Cisco 3745
AIM-VPN/HPII Hardware Encryption
Module
AIM-VPN/EPII-Plus Hardware Encryption Module
AIM-VPN/HPII-Plus Hardware Encryption Module
Restrictions for DES/3DES/AES VPN Encryption Module
• Rivest-Shamir-Adelman (RSA) manual keying is not supported.
• To achieve maximum benefit from hardware-assisted IP Payload Compression Protocol (IPPCP), it
is suggested that prefragmentation be disabled if IP compression with the Limpel Zif Stac (LZS)
algorithm is enabled on IP Security (IPSec) sessions.
How to Configure DES/3DES/AES VPN Encryption Module
There are no configuration tasks specific to the encryption hardware. Both software-based and
hardware-based encryption are configured in the same way. The system automatically detects the
presence of an encryption module at bootup and uses it to encrypt data. If no encryption hardware is
detected, software is used to encrypt data.
Additional References
The following sections provide additional references pertaining to VPN Encryption Modules.
Related Documents
Related TopicDocument Title
Installation of VPN encryption modulesInstalling Advanced Integration Modules in Cisco 2600 Series,
No new or modified standards are supported by this
feature, and support for existing standards has not been
modified by this feature.
—
MIBs
MIBsMIBs Link
No new or modified MIBs are supported by this
feature, and support for existing MIBs has not been
modified by this feature.
To locate and download MIBs for selected platforms, Cisco IOS
releases, and feature sets, use Cisco MIB Locator found at the
following URL:
http://www.cisco.com/go/mibs
RFCs
RFCsTitle
2401–2410IPSec AH, ESP
2401–2411IPsec/IKE
2401–2451IPsec/IKE
AES (NIST)Advanced Encryption Standard and The National Institute of
Standards and Technology
Technical Assistance
DescriptionLink
Technical Assistance Center (TAC) home page,
containing 30,000 pages of searchable technical
content, including links to products, technologies,
solutions, technical tips, and tools. Registered
Cisco.com users can log in from this page to access
even more content.
This section documents modified commands. All other commands used with this feature are documented
in the Cisco IOS Release 12.3 command reference publications.
To reset the statistical and error counters for a router’s hardware accelerator to zero, use the clear crypto
engine accelerator counter command in privileged EXEC mode.
clear crypto engine accelerator counter
Syntax DescriptionThis command has no arguments or keywords.
DefaultsNo default behavior or values
Command ModesPrivileged EXEC
Command History
ExamplesThe following example shows the router’s statistical and error counters being cleared to zero:
Related Commands
ReleaseModification
12.1(3)XL This command was introduced for the Cisco uBR905 cable access router.
12.2(2)XASupport was added for the Cisco uBR925 cable access router.
12.2(13)TThis command was integrated into Cisco IOS Release 12.2(13)T and
implemented for the AIM-VPN/EPII & AIM-VPN/HPII on the following
platforms: Cisco 2691, Cisco 3660, Cisco 3725, and Cisco 3745.
12.2(15)ZJThis command was implemented for the AIM-VPN/BPII on the following
platforms: Cisco 2610XM, Cisco 2611XM, Cisco 2620XM,
Cisco 2621XM, Cisco 2650XM, and Cisco 2651XM.
12.3(4)TThis command was integrated into Cisco IOS Release 12.3(4)T.
Router# clear crypto engine accelerator counter
Command Description
crypto ca Defines the parameters for the certification authority used for a
session.
crypto cisco Defines the encryption algorithms and other parameters for a
session.
crypto dynamic-map Creates a dynamic map crypto configuration for a session.
crypto engine accelerator Enables the use of the onboard hardware accelerator for IPSec
encryption.
crypto ipsecDefines the IPSec security associations and transformation sets.
crypto isakmp Enables and defines the IKE protocol and its parameters.
crypto keyGenerates and exchanges keys for a cryptographic session.
crypto mapCreates and modifies a crypto map for a session.