These formats provide a consistent framework for transferring key and authentication data which is independent of the key generation technique, encryption algorithm and authentication mechanism.

SAs contain all the information required for execution of various network security services, such as the IP layer services (such as header authentication and payload encapsulation), transport or application layer services or self-protection of negotiation traffic. The correct syntax of the crypto isakmp key command is as follows: crypto isakmp key keystring address peer-address or crypto isakmp key keystring hostname peer-hostname. This will have the key 6 enabled in your router for multiple crypto isakmp key 6.... when you have multiple tunnels configured.

First is the configuration on the local peer router (both the IP address and hostname keys have been defined):In order for outlan-rt01 and inlan-rt01 to authenticate, two things must happen.

crypto ipsec transform-set test-basic esp-des esp-sha-hmac !

The peer at 10.5.5.1 uses general-purpose keys, and the other peer uses special-usage keys.Table 26 States in Aggressive Mode Exchange The Source field in the above example indicates "Certificate," meaning that the keys were received by the router by way of the other router's certificate.Specifies the RSA public key of a remote peer.IP address local pools do not reference IKE.Specifies 168-bit DES (3DES) as the encryption algorithm.Displays the parameters for each IKE policy.This command was integrated into Cisco IOS release 12.0(7)T.A certification authority (CA) is used only with IKE policies specifying RSA signatures, not with IKE policies specifying RSA-encrypted nonces. The key definition binds the key to the remote peer's ISAKMP identity. PLS,CAUSE ON MAIN ROUTER ITS ENCRIPTED AND I KNOW IT WAS A WORD TRIAL AS SAME AS ON OTHER ROUTER2.what passowrd ur talking about?the password to login into a router?no backup for old router pls,do you mean i suppose to configure new router password as password of previous one?crypto isakmp key 6 odbdhuhuhweoeirir address 10.14.13.2  ...router Btell me where to make it right by sayThis will be the master key which will enable the key 6 feature for crypto.Have core router VPN MPLS and other router remotely,say site A,B,and c were all working fine,Hope this will make the things work.I  am facing a problem whenever router reboot, after reboot it is not  taking encrpted key in encrypted form but considering it as plaintext.3.crypto isakmp key 6 {suppose to have some key} address 10.14.16.2.....where does>>>from router A configurationPlease mark this as answered and rate the helpful posts. The SA is retained by each peer until the SA's lifetime expires. The correct syntax of the crypto isakmp key command is as follows: crypto isakmp key keystring address peer-address or crypto isakmp keykeystring hostname peer-hostnameSo, the correct answer would be the following: R1(config)# crypto isakmp key cisco123 address 209.165.200.227 R2(config)# crypto isakmp key cisco123 address 209.165.200.226 ISAKMP defines payloads for exchanging key generation and authentication data. Therefore this feature was not designed to enable the configuration mode for every IKE connection by default.Specifies the 1024-bit Diffie-Hellman group.Specifies the name of a local address pool.The name you assign to the crypto map set.If a key label is not specified, the fully qualified domain name (FQDN) of the router is used.Specifies the RSA public key of the peer you will manually configure.Enters public key configuration mode (to allow you to manually specify the RSA public keys of other devices).IKE Mode Configuration is not enabled. That way if your environment grows to the point where deploying a certification authority is warranted, you have the ability to use the same keys, making the transition much easier.A router can also use DNS for hostname resolution, but local hostname definitions are faster and don't break if there is a DNS server problem.

):The keys on outlan-rt01 and inlan-rt01 match.

(Optional) Specify the subnet address of the remote peer.