Escolar Documentos
Profissional Documentos
Cultura Documentos
Introduction
Prerequisites
Requirements
Components Used
Conventions
Background Information
Configure
Network Diagram
Configurations
Verify
Troubleshoot
Troubleshooting Commands
RouterA Debug Output
Related Information
Introduction
Cisco IOS® Software Release 12.2(8)T introduces the functionality of the router to initiate Internet Key
Exchange (IKE) in aggressive mode. For more information see Bug ID CSCdt30808 ( registered customers only)
in the Bug Toolkit. Before, the router was able to respond to a tunnel negotiation request of aggressive mode,
but it was never able to initiate it.
Prerequisites
Requirements
There are no specific prerequisites for this document.
Components Used
The information in this document is based on the software and hardware versions below.
• Cisco IOS 12.2(8)T was used on both routers, although it is not necessary to have it on the receiving
router.
Note: This configuration was tested with Cisco IOS Software Release12.2(13)T1. All aspects of the
configuration remain the same.
The information presented in this document was created from devices in a specific lab environment. All of the
devices used in this document started with a cleared (default) configuration. If you are working in a live
network, ensure that you understand the potential impact of any command before using it.
Conventions
For more information on document conventions, refer to Cisco Technical Tips Conventions.
Background Information
Note: The new command−line interface (CLI) commands are as follows:
In the sample configuration below, RouterA and RouterB have a LAN−to−LAN tunnel between them.
RouterA will always be the tunnel initiating router, and it has been configured in this example to initiate in
aggressive mode. RouterB simply has a dynamic crypto map to accept the tunnel parameters from RouterA,
although it could also have had a standard LAN−to−LAN tunnel configuration applied.
Note: In this example, RouterB does not have to be running Cisco IOS Software Release 12.2(8)T to accept
the tunnel parameters from RouterA. As mentioned above, the routers have always accepted an aggressive
mode request, they have just never been able to initiate it.
Configure
In this section, you are presented with the information to configure the features described in this document.
Note: To find additional information on the commands used in this document, use the Command Lookup
Tool ( registered customers only) .
Network Diagram
This document uses the network setup shown in the diagram below.
Configurations
This document uses these configurations:
• RouterA
• RouterB
RouterA
Building configuration...
RouterB
Building configuration...
Verify
This section provides information you can use to confirm your configuration is working properly.
Certain show commands are supported by the Output Interpreter Tool ( registered customers only) , which allows
you to view an analysis of show command output.
Troubleshoot
This section provides information you can use to troubleshoot your configuration.
Troubleshooting Commands
Note: Before issuing debug commands, please see Important Information on Debug Commands.
Related Information
• IPSec Support Page
• Technical Support − Cisco Systems