cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1663
Views
0
Helpful
0
Comments
TCC_2
Level 10
Level 10

Core issue

The decrypting peer displays the HW_VPN-1-HPRXERR: Hardware VPN0/2: Packet Encryption/Decryption error, status=4612 error message when IP Security (IPSec) packets arrive out of order.

Resolution

This  is caused by the bug  CSCdt40220

Packets can be re-ordered at these three locations:

  • The encrypting peer
     
  • The network
     
  • The decrypting peer

Note: The decrypting peer reorders packets very rarely. The only known scenario in which the decrypting peer reorders packets is when a packet is bumped to the process switch while the subsequent packets from the same tunnel are fast-switched or CEF-switched. This can occur for fragmented packets that need re-assembly.

These are some common scenarios in which out-of-order IPSec packets occur. These scenarios are considered normal behaviors:

  • Fragmentation: The decrypting peer uses process switching on fragmented packets. To minimize the impact of this problem, enable Look-Ahead-Fragmentation.
     
  • QoS: If the Quality of Service (QoS) scheduling mechanism is triggered after IPSec encryption, packets in the same IPSec Security Associations (SAs) can be transmitted out-of-order.
     
  • Pak_priority: pak_priority is an internal flag that Cisco IOS   Software sets to some of the router-generated packets that are considered critical. Critical packets include routing updates and interface keepalives. When the output interface queue is congested, the router honors the pak_priority flags to ensure the transmission of high priority packets first. So in the Generic Routing Encapsulation (GRE) over IPsec and dynamic routing protocol design, the Encapsulating Security Payload (ESP) packets can become out-of-order if the egress interface is congested and the router has to transmit encrypted routing updates first.

As a workaround, perform these steps:

  1. Issue the ip mtu command to set the Maximum Transmission Unit (MTU) size of inbound streams to less than 1400 bytes.
       
  2. Enable Look-Ahead-Fragmentation, which is also known as pre-fragmentation. For more information, refer to Pre-fragmentation for IPSec VPNs.
       
Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: