IKE keepalive - DPD

IKEv1


Dead Peer Detection (DPD) is a method that allows detection of unreachable Internet Key Exchange (IKE) peers.
RFC describes DPD negotiation procedure and two new ISAKMP NOTIFY messages. Specifically, DPD is negotiated via an exchange of the DPD ISAKMP Vendor ID payload, which is sent in the ISAKMP MM messages 3 and 4 or ISAKMP AM messages 1 and 2. DPD Requests are sent as ISAKMP R-U-THERE messages and DPD Responses are sent as ISAKMP R-U-THERE-ACK messages.

ASA support "semi-periodic" DPD only. I.e. they send R-U-THERE message to a peer if the peer was idle for  seconds. ASA may have nothing to send to the peer, but DPD is still sent if the peer is idle. If the VPN session is comletely idle the R-U-THERE messages are sent every  seconds. If there is a traffic coming from the peer the R-U-THERE messages are not sent.
If the peer doesn't respond with the R-U-THERE-ACK the ASA starts retransmitting R-U-THERE messages every seconds with a maximum of three retransmissions. After that the peer is declared dead.

Config:
Default is enabled
ASAv1# sh run all tunnel-group 203.0.113.2
tunnel-group 203.0.113.2 type ipsec-l2l
tunnel-group 203.0.113.2 general-attributes
 default-group-policy DfltGrpPolicy
tunnel-group 203.0.113.2 ipsec-attributes
 ikev1 pre-shared-key *****
 peer-id-validate req
 no chain
 no ikev1 trust-point
 isakmp keepalive threshold 10 retry 2
 no ikev2 remote-authentication
 no ikev2 local-authentication


Debug:
Jan 28 19:52:20 [IKEv1 DEBUG]Group = 203.0.113.1, IP = 203.0.113.1, Received keep-alive of type DPD R-U-THERE (seq number 0x2227aa60)
Jan 28 19:52:20 [IKEv1 DEBUG]Group = 203.0.113.1, IP = 203.0.113.1, Sending keep-alive of type DPD R-U-THERE-ACK (seq number 0x2227aa60)

















IKEv2

On Cisco VPN router, DPD is configured globally or in IKEv2 Profile

global default: 
crypto ikev2 dpd 0 0 periodic

in IKEv2 Profile
crypto ikev2 profile IKEV2-PROFILE
 match identity remote address 203.0.113.3 255.255.255.255
  authentication remote pre-share
 authentication local pre-share
 keyring local MYKEYS
 dpd 10 3 periodic


R3#sh crypto ikev2 sa detail
 IPv4 Crypto IKEv2  SA

Tunnel-id Local                 Remote                fvrf/ivrf            Status
1         203.0.113.1/4500      203.0.113.3/4500      none/none            READY
      Encr: AES-CBC, keysize: 256, PRF: SHA512, Hash: SHA512, DH Grp:5, Auth sign: PSK, Auth verify: PSK
      Life/Active Time: 86400/79 sec
      CE id: 1017, Session-id: 58
      Status Description: Negotiation done
      Local spi: FA78392E99D34D5E       Remote spi: D2BFFC45C7C0099E
      Local id: 203.0.113.1
      Remote id: 192.168.1.10
      Local req msg id:  9              Remote req msg id:  0
      Local next msg id: 9              Remote next msg id: 0
      Local req queued:  9              Remote req queued:  0
      Local window:      5              Remote window:      5
      DPD configured for 10 seconds, retry 3
      Fragmentation not configured.
      Extended Authentication not configured.
      NAT-T is detected  outside
      Cisco Trust Security SGT is disabled
      Initiator of SA : Yes

 IPv6 Crypto IKEv2  SA

In this test (one VPN router behind NAT device ), it is sending in UDP/4500

Comments

Popular posts from this blog

Firepower FMC and FTD troubleshooting

ASA IKEv1 VPN troubleshooting Steps and Tips

Firepower 2100/1100 FTD/ASA initial setup, reimage, upgrade.