03-04-2023 04:21 AM
Hi,
I have question regarding encryption fragmentation on DMVPN. Doesn't matter before or after is used, just to understand how to configure it. I tried to configure it under my tunnel interface but i got error:
R2(config-if)#crypto ipsec fragmentation before-encryption
% Crypto Fragmentation setting not applicable on tunnel interface
Is this possible only on physical interfaces that are used as NBMA? I saw that there is also crypto ipsec df-bit which i can apply on tunnel. But i didn't quite get how to use it.
so if I set up:
ip mtu 1400
no ip split-horzion eigrp 1
ip nhrp network 1
tunnel mode gre multipoint
ip nhrp map multicast dynamc
ip tcp adjust-mss 1360
tunnel source e1/0
ip add xxxxx xxxxx
how can i configure fragmentation before encryption?
03-04-2023 06:07 AM
we need to know what device model and IOS code running :
check the configuration and Limitations :
03-04-2023 06:18 AM
That prefect Q,
this table explain the behave of two command
03-05-2023 03:26 AM
Yes, i saw that table but what i didn't get from here is, first row/column header feature state. What is feature which is referring to enabled/disabled? Is that i need to configure crypto ipsec df-bit clear and that's it?! If that is all then it is clear, because when i list show run all | include crypto i don't see it, i get from that default mode is then disabled.
and following questions are about df bit state. Who is setting that bit? I mean it is our tunnel which has data to send so, what is reference "incoming"? From table it doesn't matter is it 0/1 if i enable feature.
best regards and thanks
03-05-2023 03:36 AM
let talk about column by column
1st column
crypto ipsec fragmentation before-encryption
enable meaning you run this command
disable you not run this command
2nd
crypto ipsec df-bit
this have three setting
A- clear <<- clear df-bit of any packet IPsec interface forward
B-set <<- set the df-bit of any packet IPsec interface forward
C-copy <<- copy the df-bit from receive packet to new (after encryption) for any packet IPsec interface forward
3rd
the packet I receive is it have df-bit or not
Network(packet with/without df-bit)-Router(IPsec)-Internet
that three criteria decide fragment before after and drop of some packet.
03-06-2023 03:53 AM
Hi,
thanks for response, i think that i got it now. Until now i thought that "crypto ipsec fragmentation before-encryption" is only applicable to interface and not to enabled it in global config.
R2(config)#crypto ipsec fragmentation before-encryption
on tunnel then i can use "crypto ipsec df-bit clear"
i also saw chapter:
There they put crypto ipsec df-bit clear globally but i didn't see that they put crypto ipsec fragmentation before-encryption in config. So i'm confused what and where should i put in configuration?
Br, Marijo
03-06-2023 04:02 AM - edited 03-06-2023 04:04 AM
because it optional we can config one of them or config both of them.
but if I config one of them what about second command ? the second command will use default setting
03-06-2023 05:23 AM
to sum it, I can do following:
global
R1(config)#crypto ipsec fragmentation before-encryption
R1(config)#int tun0
R1(config-if)#crypto ipsec df-bit clear
and one more thing create transform set and put it in tunnel mode
R1(config)#crypto ipsec transform-set mrki esp-aes esp-sha-hmac
R1(cfg-crypto-trans)#mode tunnel
other way is do crypto df-bit globaly with fragmentation before-encryption, which will be applied to all interfaces
R1(config)#crypto ipsec df-bit clear
R1(config)#crypto ipsec fragmentation before-encryption
and of course in transform-set do tunnel mode because restriction for fragmentation.
br, Marijo
03-06-2023 05:33 AM
Not all interface to be totally right
but to interface that you config crypto map under it.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide