I'm wondering if anyone is using the IPSEC/GRE tunnels with IP CEF on the router and HW crypto accelerator. I know that it has been the old problem and suppose to be fixed but every time I try an IOS version (12.2.11T - 12.2.15T) on 2600 or 7200 and it is still there: as soon as the IP CEF is enabled either tunnel stops forwarding or the physical Intf the tunnel is going through.
As a workaround you can try to run IPSEC over tunnel mode, instead over transport mode. If it doesn't work after you change to tunnel mode, then the workaround is to disable CEF. Try removing ip inspect from the interface you are using for IPSEC.
The IPSEC is in tunnel mode to have this fragmentation before encryption working. Everything would have been OK if it was not the DF bit set in the packets. Apparently in the IOS versions I've tried the crypto ipsec df-bit clear is not working, so I put a policy-map on the inbound intf. to clear the DF bit. This intf went into process switching mode despite the ip route-cache policy on it, so the last option would be to get CEF working.
I'm using the GRE with protection profiles (no crypto maps) but did not see any Cisco notes about this and the crypto ipsec df-bit clear being incompatible
Question We run asr9001 with XR 6.1.3, and we have a very long delay to
login w/ SSH 1 or 2 to the device compare to IOS device. After
investigation, the there is 1s delay between the client KEXDH_INIT and
the server (XR) KEXDH_REPLY. After debug ssh serv...
Introduction The purpose of this document is to demonstrate the Open
Shortest Path First (OSPF) behavior when the V-bit (Virtual-link bit) is
present in a non-backbone area. The V-bit is signaled in Type-1 LSA only
if the router is the endpoint of one or ...
Hi, I am seeing quite a few issues with patch install and wanted to
share my experience and workaround to this. Login to admin via CLI, then
access root with the “shell” command Issue “df –h” and you’ll probably
see the following directory full or nearly ...