cancel
Showing results forĀ 
Search instead forĀ 
Did you mean:Ā 
cancel
1449
Views
2
Helpful
14
Replies

crypto ipsec security-association multi-sn

hi,

is it possible to configure 

crypto ipsec security-association multi-sn


per peer? I am trying to resolve anti-reply errors and this command needs to be configured on both side of ipsec tunnel. One router involved has many tunnels and I need to configure this only on one.

 

br 

14 Replies 14

M02@rt37
VIP
VIP

Hello @DraganSkundric87318 

No, it's not possible to configure the [crypto ipsec security-association multi-sn] command per peer. This command is a global configuration command that enables or disables the use of multiple SAs for a single IPsec peer.

Best regards
.ı|ı.ı|ı. If This Helps, Please Rate .ı|ı.ı|ı.

under the crypto map for that peer there is 

set security-association multi-sn

 this way you can apply this command only for this peer

I am using VTI's and there is no this set command under ipsec profile

OK let me check how we can solve issue.

@DraganSkundric87318 

What about this command 

crypto ipsec security-association multi-sn

Not in global mode but under the interface tunnel interface? 

Best regards
.ı|ı.ı|ı. If This Helps, Please Rate .ı|ı.ı|ı.

there is no this command in interface mode, only crypto ipsec df-bit and fragmentation

ok the anti-reply issue can solve via three 
1- disable anti-reply 
2- change the size of window
3- config multi-seq num

why you can not use one of above two solution ?

Well


1. I want to keep anti-reply protection
2. Max windows size does not help
3. I do not want to change this on few hundered locations

But looks like problem is mybe in qos/VTI combination so I will try to move qos policy from physical interface to tunnel

understood, 
this command in in IOS XE, I need to return home and check CSR.
update you soon. 

Screenshot (363).png

I use CSr1000 IOS XE and there is set multi-sn under ipsec profile 
please check above 

well on ASR 1001-x  ios xe 17.06.03a there is not 

 

(config-crypto-map)#set sec
(config-crypto-map)#set security-association ?
dfbit Handling of encapsulated DF bit.
dummy Enable transmitting dummy packets
ecn Handling of ECN bit
idle-time Automatically delete IPSec SAs after a given idle period.
level specify a security association granularity level for identities
lifetime security association lifetime
replay Set replay checking.

I think I found solution but I need to check some command reference first. 

Did you ever figure this out?

can you please make new post 

thanks 

MHM

Review Cisco Networking for a $25 gift card