With PFS, every time a new security association is negotiated, a new Diffie-Hellman exchange occurs, which requires additional processing time.
Commands:
R2(config)#crypto map map1 10
R2(config-crypto-map)#set pfs ?
group1 D-H Group1 (768-bit modp)
group2 D-H Group2 (1024-bit modp)
group5 D-H Group5 (1536-bit modp)
R2(config-crypto-map)#set pfs group2
Packet captures shows that PFS consists of a quick mode exchange after the SA times out (which is what happens anyway without PFS). I didn't notice anything different about the "debug crypto ipsec" output when PFS was enabled or disabled.
No comments:
Post a Comment