Configuring the IPsec anti-replay function
This feature is supported only in FIPS mode.
The IPsec anti-replay function protects networks against anti-replay attacks by using a sliding window mechanism called anti-replay window. This function checks the sequence number of each received IPsec packet against the current IPsec packet sequence number range of the sliding window. If the sequence number is not in the current sequence number range, the packet is considered a replayed packet and is discarded.
IPsec packet de-encapsulation involves complicated calculation. De-encapsulation of replayed packets not only makes no sense, but also consumes large amounts of resources and degrades performance, resulting in DoS. IPsec anti-replay checking, when enabled, is performed before the de-encapsulation process, reducing resource waste.
In some cases, however, the sequence numbers of some normal service data packets may be out of the current sequence number range, and the IPsec anti-replay function may drop them as well, affecting the normal communications. If this happens, disable IPsec anti-replay checking or adjust the size of the anti-replay window as required.
To configure IPsec anti-replay checking:
Step | Command | Remarks |
---|---|---|
1. Enter system view. | system-view | N/A |
2. Enable IPsec anti-replay checking. | ipsec anti-replay check | Optional. Enabled by default. |
3. Set the size of the IPsec anti-replay window. | ipsec anti-replay window width | Optional. 32 by default. |
CAUTION: IPsec anti-replay checking is enabled by default. Do not disable it unless it needs to be disabled. A wider anti-replay window results in higher resource cost and more system performance degradation, which is against the original intention of the IPsec anti-replay function. Specify an anti-replay window size that is as small as possible. | ||
NOTE: IPsec anti-replay checking does not affect manually created IPsec SAs. According to the IPsec protocol, only IPsec SAs negotiated by IKE support anti-replay checking. | ||