C1941-NEMO-LTE#wr t
Building configuration...
!
! Last configuration change at 15:18:27 UTC Thu Aug 2 2012
version 15.2
service internal
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname C1941-NEMO-LTE
!
boot-start-marker
boot system flash:c1900-universalk9-mz.SPA.153-3.M2.bin
boot-end-marker
!
enable password cisco
!
ip dhcp excluded-address 10.21.65.129 10.21.65.136
!
ip dhcp pool mobile
network 10.21.65.128 255.255.255.128
default-router 10.21.65.129
option 150 ip 11.11.11.11
dns-server 4.2.2.2
!
ip cef
no ip domain lookup
no ipv6 cef
!
multilink bundle-name authenticated
chat-script LTE "" "AT!CALL1" TIMEOUT 20 "OK"
!
license udi pid CISCO1941W-A/K9 sn FTX153901PZ
license boot module c1900 technology-package securityk9
license boot module c1900 technology-package datak9
hw-module ism 0
!
controller Cellular 0/0
!
no ip ftp passive
ip ftp source-interface Vlan2
!
control-plane
!
!
line con 0
no modem enable
line aux 0
line 2
no activation-character
no exec
transport preferred none
transport input all
transport output pad telnet rlogin lapb-ta mop udptn v120 ssh
stopbits 1
line 0/0/0
script dialer LTE
modem InOut
no exec
rxspeed 100000000
txspeed 50000000
line vty 0 4
password cisco
login
transport input all
!
exception data-corruption buffer truncate
scheduler max-task-time 5000
!
End
CGR-2010 with LTE GRWIC is configured similarly to the ISR with LTE eHWIC.
C819G-4G-V is configured similarly to the ISR with LTE eHWIC with these caveats:
crypto ipsec transform-set NEMO esp-aes esp-sha-hmac
!
crypto ipsec profile NEMO
set security-association lifetime seconds 28800
set transform-set NEMO
Key Server Configuration – GDOI
!### GDOI Configuration ###
crypto gdoi group NEMO
identity number 1
server local
rekey retransmit 10 number 2
rekey authentication mypubkey rsa NEMO
rekey transport unicast
sa ipsec 1
profile NEMO
match address ipv4 NEMO-GETVPN
replay counter window-size 64
address ipv4 <KS1 address> or <KS2 address>
Server Crypto ACL (This configuration is a sample & needs to be customized for deployment)
!### Crypto ACL ###
ip access-list extended NEMO-GETVPN
deny tcp any any eq ssh
deny tcp any eq ssh any
deny udp any any eq 848
deny udp eq 848 any
deny tcp any any eq bgp !when GM uses BGP for PE-CE
deny tcp any eq bgp any !when GM uses BGP for PE-CE
!deny udp any any eq ntp !optional
!deny udp any any eq dns !optional
!deny udp any any eq snmp !optional
!deny udp any any eq syslog !optional
!deny udp any any eq 1645 !optional
!deny udp any any eq 1646 !optional
!deny udp any any eq 1812 !optional
!deny udp any any eq 1813 !optional
!deny tcp any eq 443 any !optional
!deny tcp any any eq 443 !optional
SHOW CRYPTO GDOI_________________________________________________
C1941-NEMO-LTE#sh crypto gdoi
GROUP INFORMATION
Group Name : nemo
Group Identity : 434
Rekeys received : 348
IPSec SA Direction : Both
Group Server list : 10.0.67.1
Group member : 10.0.66.1 vrf: None
Registration status : Registered
Registered with : 10.0.67.1
Re-registers in : 413 sec
Succeeded registration: 26
Attempted registration: 29
Last rekey from : 10.0.67.1
Last rekey seq num : 33
Unicast rekey received: 348
Rekey ACKs sent : 348
Rekey Rcvd(hh:mm:ss) : 00:50:06
allowable rekey cipher: any
allowable rekey hash : any
allowable transformtag: any ESP
Rekeys cumulative
Total received : 348
After latest register : 3
Rekey Acks sents : 348
ACL Downloaded From KS 10.0.67.1:
access-list permit ip any 10.245.1.0 0.0.0.255
access-list permit ip 10.245.1.0 0.0.0.255 any
KEK POLICY:
Rekey Transport Type : Unicast
Lifetime (secs) : 6810
Encrypt Algorithm : 3DES
Key Size : 192
Sig Hash Algorithm : HMAC_AUTH_SHA
Sig Key Length (bits) : 1024
TEK POLICY for the current KS-Policy ACEs Downloaded:
Tunnel0:
IPsec SA:
spi: 0xA5A7BF26(2779234086)
transform: esp-aes esp-sha-hmac
sa timing:remaining key lifetime (sec): (593)
Anti-Replay : Disabled
local crypto endpt.: 10.0.66.1, remote crypto endpt.: 0.0.0.0
path mtu 1476, ip mtu 1476, ip mtu idb Tunnel434
current outbound spi: 0xA5A7BF26(2779234086)
PFS (Y/N): N, DH group: none
inbound esp sas:
spi: 0xA5A7BF26(2779234086)
transform: esp-aes esp-sha-hmac ,
in use settings ={Tunnel, }
conn id: 89, flow_id: Onboard VPN:89, sibling_flags 80000040, crypto
map: NEMO-GETVPN
sa timing: remaining key lifetime (sec): (520)
Kilobyte Volume Rekey has been disabled
IV size: 16 bytes
replay detection support: N
Status: ACTIVE
local crypto endpt.: 10.0.66.1, remote crypto endpt.: 0.0.0.0
path mtu 1476, ip mtu 1476, ip mtu idb Tunnel434
current outbound spi: 0xA5A7BF26(2779234086)
PFS (Y/N): N, DH group: none
inbound esp sas:
spi: 0xA5A7BF26(2779234086)
transform: esp-aes esp-sha-hmac ,
in use settings ={Tunnel, }
conn id: 87, flow_id: Onboard VPN:87, sibling_flags 80000040, crypto
map: NEMO-GETVPN
sa timing: remaining key lifetime (sec): (520)
Kilobyte Volume Rekey has been disabled
IV size: 16 bytes
replay detection support: N
Status: ACTIVE
inbound ah sas:
inbound pcp sas:
outbound esp sas:
spi: 0xA5A7BF26(2779234086)
transform: esp-aes esp-sha-hmac ,
in use settings ={Tunnel, }
conn id: 88, flow_id: Onboard VPN:88, sibling_flags 80000040, crypto
map: NEMO-GETVPN
sa timing: remaining key lifetime (sec): (520)
Kilobyte Volume Rekey has been disabled
IV size: 16 bytes
replay detection support: N
Status: ACTIVE
local crypto endpt.: 10.0.66.1, remote crypto endpt.: 0.0.0.0
path mtu 1476, ip mtu 1476, ip mtu idb Tunnel434
current outbound spi: 0xA5A7BF26(2779234086)
PFS (Y/N): N, DH group: none
inbound esp sas:
spi: 0xA5A7BF26(2779234086)
transform: esp-aes esp-sha-hmac ,
in use settings ={Tunnel, }
conn id: 89, flow_id: Onboard VPN:89, sibling_flags 80000040, crypto
map: NEMO-GETVPN
sa timing: remaining key lifetime (sec): (520)
Kilobyte Volume Rekey has been disabled
IV size: 16 bytes
replay detection support: N
Status: ACTIVE
inbound ah sas:
inbound pcp sas:
outbound esp sas:
spi: 0xA5A7BF26(2779234086)
transform: esp-aes esp-sha-hmac ,
in use settings ={Tunnel, }
conn id: 90, flow_id: Onboard VPN:90, sibling_flags 80000040, crypto
map: NEMO-GETVPN
sa timing: remaining key lifetime (sec): (520)
Kilobyte Volume Rekey has been disabled
IV size: 16 bytes
replay detection support: N
Status: ACTIVE
local crypto endpt.: 10.0.66.1, remote crypto endpt.: 0.0.0.0
path mtu 1476, ip mtu 1476, ip mtu idb Tunnel434
current outbound spi: 0xA5A7BF26(2779234086)
PFS (Y/N): N, DH group: none
inbound esp sas:
spi: 0xA5A7BF26(2779234086)
transform: esp-aes esp-sha-hmac ,
in use settings ={Tunnel, }
conn id: 87, flow_id: Onboard VPN:87, sibling_flags 80000040, crypto
map: NEMO-GETVPN
sa timing: remaining key lifetime (sec): (520)
Kilobyte Volume Rekey has been disabled
IV size: 16 bytes
replay detection support: N
Status: ACTIVE
inbound ah sas:
inbound pcp sas:
outbound esp sas:
spi: 0xA5A7BF26(2779234086)
transform: esp-aes esp-sha-hmac ,
in use settings ={Tunnel, }
conn id: 88, flow_id: Onboard VPN:88, sibling_flags 80000040, crypto
map: NEMO-GETVPN
sa timing: remaining key lifetime (sec): (520)
Kilobyte Volume Rekey has been disabled
IV size: 16 bytes
replay detection support: N
Status: ACTIVE
outbound ah sas:
outbound pcp sas:
C1941-NEMO-LTE#
PING FROM INSIDE SOURCE___________________________________________
Type escape sequence to abort.
Sending 100, 100-byte ICMP Echos to 10.245.1.1, timeout is 2 seconds:
Packet sent with a source address of 10.21.65.129
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
Success rate is 100 percent (100/100), round-trip min/avg/max = 44/72/524 ms