IPsec Performance Impacted When Replay Protection is Enabled

IPsec Performance Impacted When Replay Protection is Enabled

44454
Created On 06/22/21 23:29 PM - Last Modified 04/04/25 19:01 PM


Symptom


  • Lower than expected throughput experienced on IPsec tunnel.
  • Higher the latency between client and server, the greater the performance impact.
  • You will notice the following global counter "flow_tunnel_ipsec_replay_err" statistic
> show counter global filter packet-filter yes delta yes 

Global counters:
Elapsed time since last sampling: 180.93  seconds

name                            value  rate  severity  category  aspect    description
----------------------------------------------------------------------------------------------
flow_tunnel_ipsec_replay_err    105     5     drop      flow    tunnel     Packet dropped: header sequence number is a replay


Environment


  • Palo Alto Firewall
  • PAN-OS
  • IPsec tunnel


Cause


  • Encrypted packets will be assigned with unique sequence number. On the receiving end when decrypted these sequence number will be check for sequence window size 64. If the received packet falls out of the window sequence check it will be dropped with global counter reason shown above.
  • This could happen due to packet drops happen in transit or sometime on the encryption side the sequence number happens to be out of window size. 
  • Few drops due to replay error during fast transfers and depending on latency can result in tunnel throughput performance. 
     


Resolution


  1. To resolve the issue configure the Anti Replay Window size on the Firewall.
  2. Gradually increase the window size from the default of 1024 to higher till the drops are not seen.


Actions
  • Print
  • Copy Link

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000001VhqCAE&refURL=http%3A%2F%2Fknowledgebase.paloaltonetworks.com%2FKCSArticleDetail

Choose Language