[COLOR=#000000][FONT=Courier New]R1#show crypto ipsec sa[/FONT][/COLOR] [COLOR=#000000][FONT=Courier New]interface: FastEthernet0/0[/FONT][/COLOR] [COLOR=#000000][FONT=Courier New] Crypto map tag: CMAP, local addr 10.1.2.1[/FONT][/COLOR] [COLOR=#000000][FONT=Courier New] protected vrf: (none)[/FONT][/COLOR] [COLOR=#000000][FONT=Courier New] local ident (addr/mask/prot/port): (10.1.1.0/255.255.255.0/0/0)[/FONT][/COLOR] [COLOR=#000000][FONT=Courier New] remote ident (addr/mask/prot/port): (10.3.3.0/255.255.255.0/0/0)[/FONT][/COLOR] [COLOR=#000000][FONT=Courier New] <SNIP>[/FONT][/COLOR] [COLOR=#000000][FONT=Courier New] inbound esp sas:[/FONT][/COLOR] [COLOR=#000000][FONT=Courier New] spi: 0x7048BE76(1883815542)[/FONT][/COLOR] [COLOR=#000000][FONT=Courier New] transform: esp-aes esp-sha-hmac ,[/FONT][/COLOR] [COLOR=#D100FF][FONT=Courier New][B] in use settings ={Tunnel UDP-Encaps, }[/B][/FONT][/COLOR] [COLOR=#000000][FONT=Courier New] conn id: 1, flow_id: SW:1, crypto map: CMAP[/FONT][/COLOR] [COLOR=#000000][FONT=Courier New] sa timing: remaining key lifetime (k/sec): (4580629/2937)[/FONT][/COLOR] [COLOR=#000000][FONT=Courier New] IV size: 16 bytes[/FONT][/COLOR] [COLOR=#000000][FONT=Courier New] replay detection support: Y[/FONT][/COLOR] [COLOR=#000000][FONT=Courier New] Status: ACTIVE[/FONT][/COLOR] [B][COLOR=#000000][FONT=Courier New] inbound ah sas:[/FONT][/COLOR] [COLOR=#000000][FONT=Courier New] inbound pcp sas:[/FONT][/COLOR][/B] [COLOR=#000000][FONT=Courier New] outbound esp sas:[/FONT][/COLOR] [COLOR=#000000][FONT=Courier New] spi: 0x51614C36(136533099[IMG]https://us.v-cdn.net/6030959/uploads/images/smilies/icon_cool.gif[/IMG][/FONT][/COLOR] [COLOR=#000000][FONT=Courier New] transform: esp-aes esp-sha-hmac ,[/FONT][/COLOR] [COLOR=#D100FF][FONT=Courier New][B] in use settings ={Tunnel UDP-Encaps, }[/B][/FONT][/COLOR] [COLOR=#000000][FONT=Courier New] conn id: 2, flow_id: SW:2, crypto map: CMAP[/FONT][/COLOR] [COLOR=#000000][FONT=Courier New] sa timing: remaining key lifetime (k/sec): (4580629/292[IMG]https://us.v-cdn.net/6030959/uploads/images/smilies/icon_cool.gif[/IMG][/FONT][/COLOR] [COLOR=#000000][FONT=Courier New] IV size: 16 bytes[/FONT][/COLOR] [COLOR=#000000][FONT=Courier New] replay detection support: Y[/FONT][/COLOR] [COLOR=#000000][FONT=Courier New] Status: ACTIVE[/FONT][/COLOR] [COLOR=#000000][FONT=Courier New] outbound ah sas:[/FONT][/COLOR] [COLOR=#000000][FONT=Courier New] outbound pcp sas:[/FONT][/COLOR]
lrb wrote: » Unless the two devices are using aggressive mode
lrb wrote: » The IKE phase 1 is shortened to a three message exchange, but the identity of the initiator (e.g. IP address, hostname) is sent in the first message and is sent in the clear. It's big use case is when you have dynamic IP addresses on one or both of the peers