<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://lms.onnocenter.or.id/wiki/index.php?action=history&amp;feed=atom&amp;title=IPSec%3A_IPv6_Site_to_Site_di_Cisco</id>
	<title>IPSec: IPv6 Site to Site di Cisco - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://lms.onnocenter.or.id/wiki/index.php?action=history&amp;feed=atom&amp;title=IPSec%3A_IPv6_Site_to_Site_di_Cisco"/>
	<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=IPSec:_IPv6_Site_to_Site_di_Cisco&amp;action=history"/>
	<updated>2026-04-25T20:43:37Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.45.1</generator>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=IPSec:_IPv6_Site_to_Site_di_Cisco&amp;diff=67234&amp;oldid=prev</id>
		<title>Unknown user: Created page with &quot;Sumber: https://community.cisco.com/t5/networking-knowledge-base/configuration-example-site-to-site-vpn-for-ipv6-ipsec/ta-p/3134857  Step 1: Configure IKE Policy and Pre-share...&quot;</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=IPSec:_IPv6_Site_to_Site_di_Cisco&amp;diff=67234&amp;oldid=prev"/>
		<updated>2022-12-13T02:05:41Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;Sumber: https://community.cisco.com/t5/networking-knowledge-base/configuration-example-site-to-site-vpn-for-ipv6-ipsec/ta-p/3134857  Step 1: Configure IKE Policy and Pre-share...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;Sumber: https://community.cisco.com/t5/networking-knowledge-base/configuration-example-site-to-site-vpn-for-ipv6-ipsec/ta-p/3134857&lt;br /&gt;
&lt;br /&gt;
Step 1: Configure IKE Policy and Pre-shared Key:&lt;br /&gt;
Step 2: Configuring an IPsec Transform Set and IPsec Profile:&lt;br /&gt;
Step 3: Configure an ISAKMP Profile in IPv6:&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Introduction:&lt;br /&gt;
This document discuss about IPv6 IPsec Site-to-Site VPN Using Virtual Tunnel Interface with configuration example.&lt;br /&gt;
&lt;br /&gt;
Cisco IOS IPsec functionality provides network data encryption at the IP packet level, offering a robust, standards-based security solution. IPsec provides data authentication and anti-replay services in addition to data confidentiality services. With IPsec, data can be sent across a public network without observation, modification, or spoofing.&lt;br /&gt;
General usage scenarios for IPv6 IPSec:&lt;br /&gt;
1) Site-to-site VPN – protect all IPv6 traffic between two trusted networks&lt;br /&gt;
2) Configured Secure Tunnel – protect IPv6 traffic being tunneled over an non trusted IPv4 network.&lt;br /&gt;
3) IPSec can also be used to protect control plane functions, such as IPSec to protect OSPFv3.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Background:&lt;br /&gt;
In following example IPSec-protected tunnel is set up between CE1 and CE2 to communicate over public network. The routers ISP_IR1 and ISP_IR2 have global IPv6 address and does not have  knowledge about private subnets present on CE1 and CE2.&lt;br /&gt;
&lt;br /&gt;
Topology diagram:&lt;br /&gt;
&lt;br /&gt;
Ipv6Ipvsec.jpg&lt;br /&gt;
&lt;br /&gt;
Configuration overview:&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Site-to-site VPN is configure on router as follows:&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Step 1: Configure IKE Policy and Pre-shared Key:&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Configure same ISAKMP policy on the routers CE1 and CE2&lt;br /&gt;
&lt;br /&gt;
CE1#conf t&lt;br /&gt;
Enter configuration commands, one per line.  End with CNTL/Z.&lt;br /&gt;
CE1(config)#crypto isakmp policy 10&lt;br /&gt;
CE1(config-isakmp)#encryption 3des&lt;br /&gt;
CE1(config-isakmp)#group 2&lt;br /&gt;
CE1(config-isakmp)#authentication pre-share&lt;br /&gt;
CE1(config-isakmp)#exit&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Each router must be configured with the same key, but the configuration statement should designate the address of the appropriate interface on the peer router.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
CE1:&lt;br /&gt;
&lt;br /&gt;
CE1(config)#crypto isakmp key 0 ipsecvpn address ipv6 2002::1/128&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
CE2:&lt;br /&gt;
&lt;br /&gt;
CE2(config)#crypto isakmp key 0 ipsecvpn address ipv6 2001::1/128&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
These keys are default ISAKMP keyring. We can use multiple named keyrings used when the router is hosting remote client VPNs for multiple different groups of clients.&lt;br /&gt;
&lt;br /&gt;
crypto keyring keyring-name ……………(to specify keyring)&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Step 2: Configuring an IPsec Transform Set and IPsec Profile:&lt;br /&gt;
Configure same IPsec Transform Set and IPsec Profile on the routers CE1 and CE2:&lt;br /&gt;
&lt;br /&gt;
CE1(config)#crypto ipsec transform-set ipv6_tran esp-3des esp-sha-hmac&lt;br /&gt;
CE1(cfg-crypto-trans)#mode tunnel&lt;br /&gt;
CE1(cfg-crypto-trans)#exit&lt;br /&gt;
CE1(config)#crypto ipsec profile ipv6_ipsec_pro ……(This transform set need to bind in VTI step4)&lt;br /&gt;
CE1(ipsec-profile)#set transform-set ipv6_tran&lt;br /&gt;
CE1(ipsec-profile)#exit&lt;br /&gt;
CE1(config)#&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Step 3: Configure an ISAKMP Profile in IPv6:&lt;br /&gt;
ISAKMP profile is configured in the routers CE1 and CE2 and ensure that  configuration statement must designate the identity address of the appropriate interface on the peer router.&lt;br /&gt;
&lt;br /&gt;
CE1(config)#crypto isakmp profile 3des&lt;br /&gt;
% A profile is deemed incomplete until it has match identity statements&lt;br /&gt;
CE1(conf-isa-prof)#self-identity address ipv6&lt;br /&gt;
CE1(conf-isa-prof)#match identity address ipv6 2002::1/128&lt;br /&gt;
CE1(conf-isa-prof)#keyring default&lt;br /&gt;
CE1(conf-isa-prof)# exit&lt;br /&gt;
CE1(config)#&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Step 4: Configure ipsec IPv6 VTI :&lt;br /&gt;
&lt;br /&gt;
Configuring IPv6 IPsec VTI on router is pretty simple&lt;br /&gt;
&lt;br /&gt;
CE1(config)#int tunnel 1&lt;br /&gt;
CE1(config-if)#ipv6 enable&lt;br /&gt;
CE1(config-if)#ipv6 address 2012::1/64&lt;br /&gt;
CE1(config-if)#tunnel source 2001::1&lt;br /&gt;
CE1(config-if)#tunnel destination 2002::1&lt;br /&gt;
CE1(config-if)#tunnel mode ipsec ipv6&lt;br /&gt;
CE1(config-if)#tunnel protection ipsec profile ipv6_ipsec_pro&lt;br /&gt;
*Mar  1 01:32:30.907: %CRYPTO-6-ISAKMP_ON_OFF: ISAKMP is ON&lt;br /&gt;
CE1(config-if)#exit&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
CE2(config)#int tunnel 1&lt;br /&gt;
CE2(config-if)#ipv6 enable&lt;br /&gt;
CE2(config-if)#ipv6 address 2012::2/64&lt;br /&gt;
CE2(config-if)#tunnel source 2002::1&lt;br /&gt;
CE2(config-if)#tunnel destination 2001::1&lt;br /&gt;
CE2(config-if)#tunnel mode ipsec ipv6&lt;br /&gt;
CE2(config-if)#tunnel protection ipsec profile ipv6_ipsec_pro&lt;br /&gt;
*Mar  1 01:32:30.907: %CRYPTO-6-ISAKMP_ON_OFF: ISAKMP is ON&lt;br /&gt;
CE2(config-if)#exit&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
To make the tunnel as best path for the remote site network, you must configure static routes in the routers CE1 and CE2.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
CE1:&lt;br /&gt;
&lt;br /&gt;
CE1(config)#ipv6 route FC01::/64 2012::2&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
CE2:&lt;br /&gt;
&lt;br /&gt;
CE2(config)#ipv6 route FC00::/64 2012::1&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Verification commands:&lt;br /&gt;
1) This command displays the active ISAKMP sessions on the router&lt;br /&gt;
&lt;br /&gt;
CE1#show crypto isakmp sa&lt;br /&gt;
IPv4 Crypto ISAKMP SA&lt;br /&gt;
dst             src             state          conn-id slot status&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
IPv6 Crypto ISAKMP SA&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
dst: 2002::1&lt;br /&gt;
src: 2001::1&lt;br /&gt;
state: QM_IDLE         conn-id:   1007 slot:    0 status: ACTIVE&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
To displays a summary of the configuration information for the crypto engines.&lt;br /&gt;
&lt;br /&gt;
CE1#show crypto engine connection active&lt;br /&gt;
Crypto Engine Connections&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
   ID Interface  Type  Algorithm           Encrypt  Decrypt IP-Address&lt;br /&gt;
     1 Tu1        IPsec 3DES+SHA                  0       95 2001::1&lt;br /&gt;
     2 Tu1        IPsec 3DES+SHA                128        0 2001::1&lt;br /&gt;
  1007 Tu1        IKE   SHA+3DES                  0        0 2001::1&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
CE1#ping fc01::1 source fc00::1&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Type escape sequence to abort.&lt;br /&gt;
Sending 5, 100-byte ICMP Echos to FC01::1, timeout is 2 seconds:&lt;br /&gt;
Packet sent with a source address of FC00::1&lt;br /&gt;
!!!!!&lt;br /&gt;
Success rate is 100 percent (5/5), round-trip min/avg/max = 36/187/388 ms&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
CE1#traceroute&lt;br /&gt;
Protocol [ip]: ipv6&lt;br /&gt;
Target IPv6 address: fc01::1&lt;br /&gt;
Source address: fc00::1&lt;br /&gt;
Insert source routing header? [no]:&lt;br /&gt;
Numeric display? [no]:&lt;br /&gt;
Timeout in seconds [3]:&lt;br /&gt;
Probe count [3]:&lt;br /&gt;
Minimum Time to Live [1]:&lt;br /&gt;
Maximum Time to Live [30]:&lt;br /&gt;
Priority [0]:&lt;br /&gt;
Port Number [33434]:&lt;br /&gt;
Type escape sequence to abort.&lt;br /&gt;
Tracing the route to FC01::1&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
  1 FC01::1 304 msec 184 msec 160 msec&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Related Information:&lt;br /&gt;
http://www.cisco.com/en/US/docs/ios-xml/ios/ipv6/configuration/15-2mt/ip6-ipsec.html&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
http://tools.ietf.org/html/rfc4294#page-10&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
                                   &lt;br /&gt;
&lt;br /&gt;
Base Initial configuration:&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
IPv6 Configuration&lt;br /&gt;
 :configurationconfiguration_exampleexampleipsecipv6site-to-sitesite-to-site_vpnvpn&lt;br /&gt;
135431-CE2.txt.zip&lt;br /&gt;
135429-ISR_IR2.txt.zip&lt;br /&gt;
135432-CE1.txt.zip&lt;br /&gt;
135430-ISR_IR1.txt.zip&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Referensi==&lt;br /&gt;
&lt;br /&gt;
* https://community.cisco.com/t5/networking-knowledge-base/configuration-example-site-to-site-vpn-for-ipv6-ipsec/ta-p/3134857&lt;/div&gt;</summary>
		<author><name>Unknown user</name></author>
	</entry>
</feed>