I don't think this will resolve the issue. If you use this command then no path MTU is performed and the DF bit in the IPSec header is set to 0 and packet is fragmented if required. The default behavior is to copy the DF bit from the IP packet to the IPSec header and by default routers do not set DF bit that means its already 0. you router is already performing fragmentation.
Work around:
1. Either decrease the mtu and mss on your tunnel interface.
Router(config)# interface tunnel 1
Router(config-if)# ip tcp adjust-mss 1360
Router(config-if)# ip mtu 1400
2. Or you can use "crypto ipsec fragmentation before-encryption"
The Pre-fragmentation for IPsec VPNs feature increases the decrypting router's performance by enabling it to operate in the high-performance CEF path instead of the process path. If the routers are performing fragmentation on behalf of the source node, it may be desirable to have the encryption performed prior to encryption. This prevents the destination tunnel router from having to reassemble the fragments and then perform the decryption.It will reduce the CPU overhead.
2. Errors should not increment. Check your config if these errors increment.
Also try to debug your ipsec sa to see what is causing these errors.
HTH
"Please rate helpful posts"