When using pre-shared key (PSK) authentication on a Site-to-Site VPN using Cisco IOS-XE routers, the IP address of the egress interface is used to match the PSK and authenticate the peer. If a spoke router has a dynamic IP address, which could change, this provides a challenge performing PSK authentication based on the IP address. Some administrators configure a PSK to match “any” IP address (0.0.0.0/0.0.0.0), which is insecure.
One answer is using certificates for authentication, which can create additional complexity, and some administrators shy away from such deployment. However, PSK authentication can be used with dynamic authentication based on the IKE identity sent from the spoke, rather than the IP address. On the initiator (the spoke router) the PSK lookup is based on the hub router’s peer IP address or hostname, because the peer IKE identity is not yet known. On responder (the hub router) the PSK lookup can be based on peer IP address or IKE identity, which is received in the IKE_AUTH request from the initiator.
The table below summarises the PSK lookup options
Key lookup parameter | Initiator or Responder |
Peer address | Both |
Peer hostname | Initiator and crypto maps only |
Peer identity type
– Address – Key-ID – FQDN |
Responder only |
When the spoke router is configured to send its local IKE identity to the hub using either the FQDN, Email or Key-ID, the hub router can use this IKE identity for the PSK lookup. The dynamic public IP address of the spoke router can change and has no impact on authentication to the hub.
Configuration
The information below represents the relevant configuration to define the IKE identity used for PSK authentication on a VPN.
Hub router
Create a keyring and define a peer, set the identity to match the identity set in the IKEv2 profile on the peer.
crypto ikev2 keyring KEYRING peer SPOKE1 identity fqdn SPOKE1.LAB.LOCAL pre-shared-key Cisco1234 ! peer SPOKE2 identity fqdn SPOKE2.LAB.LOCAL pre-shared-key Cisco5678 ! crypto ikev2 profile IKEV2-PROFILE match identity remote fqdn domain LAB.LOCAL identity local fqdn HUB.LAB.LOCAL authentication remote pre-share authentication local pre-share keyring local KEYRING virtual-template 1
Spoke router
Spoke must be configured with the IP address of the hub (or 0.0.0.0/0.0.0.0) not the IKE identity.
crypto ikev2 keyring KEYRING peer HUB address 0.0.0.0 0.0.0.0 pre-shared-key Cisco1234
Define the local identity to send to the peer (hub), it’s this identity that is used by the hub to perform the PSK lookup.
crypto ikev2 profile IKEV2-PROFILE match identity remote fqdn domain LAB.LOCAL identity local fqdn SPOKE1.LAB.LOCAL authentication remote pre-share authentication local pre-share keyring local KEYRING
Debugs
The IKE identity used by the hub to match the PSK is identity local fqdn SPOKE1.LAB.LOCAL which is configured on the spoke in the IKEv2 profile.
From the hub router debugs below we can determine the hub receiver the spoke routers peer identity as ‘SPOKE1.LAB.LOCAL’ of type ‘FQDN’ and was subsequently able to match and get the PSK for the spoke router.
*Apr 3 08:17:36.001: IKEv2:(SESSION ID = 7,SA ID = 1):Searching policy based on peer's identity 'SPOKE1.LAB.LOCAL' of type 'FQDN' *Apr 3 08:17:36.001: IKEv2:found matching IKEv2 profile 'IKEV2-PROFILE' *Apr 3 08:17:36.001: IKEv2:% Getting preshared key from profile keyring KEYRING *Apr 3 08:17:36.002: IKEv2:% Matched peer block SPOKE1 *Apr 3 08:17:36.002: IKEv2:Searching Policy with fvrf 0, local address 192.168.251.5 *Apr 3 08:17:36.002: IKEv2:Found Policy 'IKEV2-POLICY' *Apr 3 08:17:36.003: IKEv2:(SESSION ID = 7,SA ID = 1):not a VPN-SIP session *Apr 3 08:17:36.003: IKEv2:(SESSION ID = 7,SA ID = 1):Verify peer's policy *Apr 3 08:17:36.004: IKEv2:(SESSION ID = 7,SA ID = 1):Peer's policy verified *Apr 3 08:17:36.005: IKEv2:(SESSION ID = 7,SA ID = 1):Get peer's authentication method *Apr 3 08:17:36.005: IKEv2:(SESSION ID = 7,SA ID = 1):Peer's authentication method is 'PSK' *Apr 3 08:17:36.005: IKEv2:(SESSION ID = 7,SA ID = 1):Get peer's preshared key for SPOKE1.LAB.LOCAL *Apr 3 08:17:36.005: IKEv2:(SESSION ID = 7,SA ID = 1):Verify peer's authentication data *Apr 3 08:17:36.005: IKEv2:(SESSION ID = 7,SA ID = 1):Use preshared key for id SPOKE1.LAB.LOCAL, key len 9