Reverse-Route Injection - Cisco IOS XR Configuration Manual

System security configuration guide
Hide thumbs Also See for IOS XR:
Table of Contents

Advertisement

Information About Implementing IPSec Networks
Table 4
Pre-Fragmentation for Cisco IPSec VPN SPA Dependencies
Pre-Fragmentation for IPSec VPN
SPAs Feature State (Enabled or
Disabled)
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Disabled
Disabled
Disabled
Disabled
Disabled
Disabled
1. A packet that is sent to egress interfaces can get fragmented on an egress LC under the following conditions: Packet exceeds the MTU of the egress
physical interface. The df-bit is not set on the outer IP header.

Reverse-Route Injection

Reverse-Route Injection (RRI) is the ability of static routes to be automatically inserted into the routing
process for those networks and hosts protected by a remote tunnel endpoint. These protected hosts and
networks are known as remote proxy identities.
Each route is created on the basis of the remote proxy network and mask, with the next hop to this
network being the remote tunnel endpoint. By using the remote tunnel endpoint as the next hop, the
traffic is forced through the crypto process to be encrypted.
After the static route is created on the VPN router, this information is propagated to upstream devices,
allowing them to determine the appropriate VPN router in which to send returning traffic to maintain
IPSec state flows. Being able to determine the appropriate VPN router is particularly useful when
multiple VPN routers are used at a site to provide load balancing or automatic switchover, or when the
remote VPN devices are not accessible through a default route. Routes are created in either the global
routing table or the appropriate virtual route forwarding (VRF) table.
Cisco IOS XR System Security Configuration Guide
SC-100
Service IPSec Interface
"crypto ipsec df-bit"
Configuration
crypto ipsec df-bit copy
crypto ipsec df-bit copy
crypto ipsec df-bit clear
crypto ipsec df-bit clear
crypto ipsec df-bit set
crypto ipsec df-bit set
crypto ipsec df-bit copy
crypto ipsec df-bit copy
crypto ipsec df-bit clear
crypto ipsec df-bit clear
crypto ipsec df-bit set
crypto ipsec df-bit set
Implementing IPSec Network Security on Cisco IOS XR Software
Incoming Packet
DF Bit State
Result
0
Fragmentation occurs before
encryption.
1
Packets are dropped.
0
Fragmentation occurs before
encryption.
1
Packets are sent to egress interfaces (not
fragmented before encryption).
0
Fragmentation occurs before
encryption.
1
Packets are dropped.
0
Packets are sent to egress interfaces.
1
Packets are dropped.
0
Packets are sent to egress interfaces.
1
Packets are sent to egress interfaces.
0
Packets are sent to egress interfaces.
1
Packets are dropped.
1
1
1
1
1

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Ios xr 3.5

Table of Contents