cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
781
Views
0
Helpful
5
Replies

VPN setup command query?

dan_track
Level 1
Level 1

Hi,

I've noticed two set of commands on my asa 5520:

One states: "isakmp policy"

and the other states: "crypto isakmp policy"

Can someone please explain why there are two sets and what the difference is, and when would you use one over the other?

Thanks

Dan

2 Accepted Solutions

Accepted Solutions

Jon Marshall
Hall of Fame
Hall of Fame

Dan

They do the same thing. The isakmp policy commands have been replaced with the crypto isakmp policy commands -

http://www.cisco.com/en/US/docs/security/asa/asa80/command/reference/c5.html#wp2191760

Jon

View solution in original post

Collin Clark
VIP Alumni
VIP Alumni

Dan-

There is no difference between the two.

ASA1(config)# isakmp ?

configure mode commands/options:

am-disable Disable inbound aggressive mode connections

client Set client configuration policy (DEPRECATED - see 'help

isakmp')

disconnect-notify Enable disconnect notification to peers

enable Enable ISAKMP on the specified interface

identity Set identity type (address, hostname or key-id)

ipsec-over-tcp Enable and configure IPSec over TCP

keepalive Set keepalive interval (DEPRECATED - see 'help isakmp')

key Set pre-shared key for remote peer (DEPRECATED - see 'help

isakmp')

nat-traversal Enable and configure nat-traversal

peer Set xauth and config mode exemption for the specified peer

(DEPRECATED - see 'help isakmp')

policy Set ISAKMP policy suite

reload-wait Wait for voluntary termination of existing connections

before reboot

ASA1(config)# crypto isakmp ?

configure mode commands/options:

am-disable Disable inbound aggressive mode connections

client Set client configuration policy (DEPRECATED - see 'help

isakmp')

disconnect-notify Enable disconnect notification to peers

enable Enable ISAKMP on the specified interface

identity Set identity type (address, hostname or key-id)

ipsec-over-tcp Enable and configure IPSec over TCP

keepalive Set keepalive interval (DEPRECATED - see 'help isakmp')

key Set pre-shared key for remote peer (DEPRECATED - see 'help

isakmp')

nat-traversal Enable and configure nat-traversal

peer Set xauth and config mode exemption for the specified peer

(DEPRECATED - see 'help isakmp')

policy Set ISAKMP policy suite

reload-wait Wait for voluntary termination of existing connections

before reboot

"iskamp policy" is left over from the 6.x code, I have to assume for backwards compatibility.

Hope that helps.

View solution in original post

5 Replies 5

Jon Marshall
Hall of Fame
Hall of Fame

Dan

They do the same thing. The isakmp policy commands have been replaced with the crypto isakmp policy commands -

http://www.cisco.com/en/US/docs/security/asa/asa80/command/reference/c5.html#wp2191760

Jon

Collin Clark
VIP Alumni
VIP Alumni

Dan-

There is no difference between the two.

ASA1(config)# isakmp ?

configure mode commands/options:

am-disable Disable inbound aggressive mode connections

client Set client configuration policy (DEPRECATED - see 'help

isakmp')

disconnect-notify Enable disconnect notification to peers

enable Enable ISAKMP on the specified interface

identity Set identity type (address, hostname or key-id)

ipsec-over-tcp Enable and configure IPSec over TCP

keepalive Set keepalive interval (DEPRECATED - see 'help isakmp')

key Set pre-shared key for remote peer (DEPRECATED - see 'help

isakmp')

nat-traversal Enable and configure nat-traversal

peer Set xauth and config mode exemption for the specified peer

(DEPRECATED - see 'help isakmp')

policy Set ISAKMP policy suite

reload-wait Wait for voluntary termination of existing connections

before reboot

ASA1(config)# crypto isakmp ?

configure mode commands/options:

am-disable Disable inbound aggressive mode connections

client Set client configuration policy (DEPRECATED - see 'help

isakmp')

disconnect-notify Enable disconnect notification to peers

enable Enable ISAKMP on the specified interface

identity Set identity type (address, hostname or key-id)

ipsec-over-tcp Enable and configure IPSec over TCP

keepalive Set keepalive interval (DEPRECATED - see 'help isakmp')

key Set pre-shared key for remote peer (DEPRECATED - see 'help

isakmp')

nat-traversal Enable and configure nat-traversal

peer Set xauth and config mode exemption for the specified peer

(DEPRECATED - see 'help isakmp')

policy Set ISAKMP policy suite

reload-wait Wait for voluntary termination of existing connections

before reboot

"iskamp policy" is left over from the 6.x code, I have to assume for backwards compatibility.

Hope that helps.

Sorry for the hijacking Jon, you're still quicker than I am.

Collin

No need to apologize, i've done it to you before.

Key thing is that we both agree :-)

Jon

Im not hijacking here just commenting - the more additional info the better

Jorge Rodriguez
Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community:

Review Cisco Networking products for a $25 gift card