<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic What is the risk or effect of this command crypto ipsec security-association replay disable? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/what-is-the-risk-or-effect-of-this-command-crypto-ipsec-security/m-p/3001169#M909318</link>
    <description>&lt;P&gt;What is the risk or effect of this command crypto ipsec security-association replay disable?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thank You.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;vrian&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 13:57:54 GMT</pubDate>
    <dc:creator>vrian_colaba</dc:creator>
    <dc:date>2020-02-21T13:57:54Z</dc:date>
    <item>
      <title>What is the risk or effect of this command crypto ipsec security-association replay disable?</title>
      <link>https://community.cisco.com/t5/network-security/what-is-the-risk-or-effect-of-this-command-crypto-ipsec-security/m-p/3001169#M909318</link>
      <description>&lt;P&gt;What is the risk or effect of this command crypto ipsec security-association replay disable?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thank You.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;vrian&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 13:57:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/what-is-the-risk-or-effect-of-this-command-crypto-ipsec-security/m-p/3001169#M909318</guid>
      <dc:creator>vrian_colaba</dc:creator>
      <dc:date>2020-02-21T13:57:54Z</dc:date>
    </item>
    <item>
      <title>Why you might want to do it</title>
      <link>https://community.cisco.com/t5/network-security/what-is-the-risk-or-effect-of-this-command-crypto-ipsec-security/m-p/3001170#M909319</link>
      <description>&lt;P&gt;Why you might want to do it is described here:&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/support/docs/ip/internet-key-exchange-ike/116858-problem-replay-00.html&lt;/P&gt;
&lt;P&gt;Exactly what it does is further described here:&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/ios/ios_xe/sec_secure_connectivity/configuration/guide/convert/sec_ipsec_data_plane_xe_3s_book/sec_ipsec_antireplay_xe.html#wp1056290&lt;/P&gt;
&lt;P&gt;Quoting,&amp;nbsp;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P class="pB1_Body1"&gt;Cisco IPsec authentication provides anti-replay protection against an attacker duplicating encrypted packets by assigning a unique sequence number to each encrypted packet. (Security association [SA] anti-replay is a security service in which the receiver can reject old or duplicate packets to protect itself against replay attacks.) The decryptor checks off the sequence numbers that it has seen before. The encryptor assigns sequence numbers in an increasing order. The decryptor remembers the value X of the highest sequence number that it has already seen. N is the window size, and the decryptor also remembers whether it has seen packets having sequence numbers from X-N+1 through X. Any packet with the sequence number X-N is discarded. Currently, N is set at 64, so only 64 packets can be tracked by the decryptor.&lt;/P&gt;
&lt;P&gt;&lt;A name="wp1056224"&gt;&lt;/A&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="pB1_Body1"&gt;At times, however, the 64-packet window size is not sufficient. For example, Cisco quality of service (QoS) gives priority to high-priority packets, which could cause some low-priority packets to be discarded even though they could be one of the last 64 packets received by the decryptor. The IPsec Anti-Replay Window: Expanding and Disabling feature allows you to expand the window size, allowing the decryptor to keep track of more than 64 packets.&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;</description>
      <pubDate>Fri, 18 Nov 2016 04:35:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/what-is-the-risk-or-effect-of-this-command-crypto-ipsec-security/m-p/3001170#M909319</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2016-11-18T04:35:18Z</dc:date>
    </item>
  </channel>
</rss>

