[j-nsp] Information for expected fragmentation behavior on IPsec tunnel

2012-08-10 Thread Terry Jones
Greetings All,

 

Could someone please point me in the direction of some good information for
a current setup I have and would like to know what the expected behavior is.

 

I have a site-to-site VPN setup between two SRX's. I'm in a development lab
that has a static NAT out to the internet through the corporate network.
(The other lab I'm connecting to is not local). Our connection to the
corporate network is to an ASA that DOES NOT support jumbo frames. I have
jumbo frames configured on the st0 interface and all interfaces all the way
back to the hosts on my side of the network. Same goes for the lab on the
other side of the tunnel. So I have 9000 bytes configured end-to-end,
however the transport the tunnel is configured across only supports std 1500
bytes frames. 

 

The developers are sending 2000+ bytes sized packets that have the DF bit
set (and it has to be as such for now). 

 

I am trying to determine the expected behavior. I've been told that the
IPsec tunnel will fragment the traffic b/c it will not copy the DF bit from
the original packet once it is encapsulated, however, I cannot ping through
the tunnel with large packet sizes and the DF bit set. I've found a lot of
information and have worked a lot with fragmentation, but can't find
anything on this exact type of scenario.

 

Thanks in advance for any input or information.

 

Sincerely,

Terry

 

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Information for expected fragmentation behavior on IPsec tunnel

2012-08-10 Thread Wayne Tucker
It should be dependent on the df-bit setting on the VPN.  I don't
remember which behavior is default, but setting it to clear may do
what you want.

:w


On Fri, Aug 10, 2012 at 12:36 PM, Terry Jones terry.jo...@war-eagle.me wrote:
 Greetings All,



 Could someone please point me in the direction of some good information for
 a current setup I have and would like to know what the expected behavior is.



 I have a site-to-site VPN setup between two SRX's. I'm in a development lab
 that has a static NAT out to the internet through the corporate network.
 (The other lab I'm connecting to is not local). Our connection to the
 corporate network is to an ASA that DOES NOT support jumbo frames. I have
 jumbo frames configured on the st0 interface and all interfaces all the way
 back to the hosts on my side of the network. Same goes for the lab on the
 other side of the tunnel. So I have 9000 bytes configured end-to-end,
 however the transport the tunnel is configured across only supports std 1500
 bytes frames.



 The developers are sending 2000+ bytes sized packets that have the DF bit
 set (and it has to be as such for now).



 I am trying to determine the expected behavior. I've been told that the
 IPsec tunnel will fragment the traffic b/c it will not copy the DF bit from
 the original packet once it is encapsulated, however, I cannot ping through
 the tunnel with large packet sizes and the DF bit set. I've found a lot of
 information and have worked a lot with fragmentation, but can't find
 anything on this exact type of scenario.



 Thanks in advance for any input or information.



 Sincerely,

 Terry



 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] Information for expected fragmentation behavior on IPsec tunnel

2012-08-10 Thread Terry Jones
The default is actually to clear the df-bit, which I have verified on the
srx, however, if this is case, then the traffic should be fragmenting when I
ping with large packets setting the df-bit. This setting should stay within
the encapsulated packet and then the outer ipsec packet is set to clear and
the packet should be fragmenting, which is it not.

I've opened a JTAC case, so we'll see what they say.

tjones@srx1-net04 show security ipsec security-associations index 131073
node0:
--
  ID: 131073 Virtual-system: root, VPN Name: Denver-CN
  Local Gateway: a.a.a.a, Remote Gateway: b.b.b.b
  Local Identity: ipv4_subnet(any:0,[0..7]=0.0.0.0/0)
  Remote Identity: ipv4_subnet(any:0,[0..7]=0.0.0.0/0)
  Version: IKEv1
DF-bit: clear
Bind-interface: st0.3

Direction: inbound, SPI: 7075d78, AUX-SPI: 0
  , VPN Monitoring: UP
Hard lifetime: Expires in 3529 seconds
Lifesize Remaining:  Unlimited
Soft lifetime: Expires in 2973 seconds
Mode: Tunnel(10 10), Type: dynamic, State: installed
Protocol: ESP, Authentication: hmac-sha1-96, Encryption: 3des-cbc
Anti-replay service: counter-based enabled, Replay window size: 64

Direction: outbound, SPI: 2acb634b, AUX-SPI: 0
  , VPN Monitoring: UP
Hard lifetime: Expires in 3529 seconds
Lifesize Remaining:  Unlimited
Soft lifetime: Expires in 2973 seconds
Mode: Tunnel(10 10), Type: dynamic, State: installed
Protocol: ESP, Authentication: hmac-sha1-96, Encryption: 3des-cbc
Anti-replay service: counter-based enabled, Replay window size: 64

Thanks,
Terry 

-Original Message-
From: Wayne Tucker [mailto:wa...@tuckerlabs.com] 
Sent: Friday, August 10, 2012 1:59 PM
To: Terry Jones
Cc: juniper-nsp@puck.nether.net
Subject: Re: [j-nsp] Information for expected fragmentation behavior on
IPsec tunnel

It should be dependent on the df-bit setting on the VPN.  I don't remember
which behavior is default, but setting it to clear may do what you want.

:w


On Fri, Aug 10, 2012 at 12:36 PM, Terry Jones terry.jo...@war-eagle.me
wrote:
 Greetings All,



 Could someone please point me in the direction of some good 
 information for a current setup I have and would like to know what the
expected behavior is.



 I have a site-to-site VPN setup between two SRX's. I'm in a 
 development lab that has a static NAT out to the internet through the
corporate network.
 (The other lab I'm connecting to is not local). Our connection to the 
 corporate network is to an ASA that DOES NOT support jumbo frames. I 
 have jumbo frames configured on the st0 interface and all interfaces 
 all the way back to the hosts on my side of the network. Same goes for 
 the lab on the other side of the tunnel. So I have 9000 bytes 
 configured end-to-end, however the transport the tunnel is configured 
 across only supports std 1500 bytes frames.



 The developers are sending 2000+ bytes sized packets that have the DF 
 bit set (and it has to be as such for now).



 I am trying to determine the expected behavior. I've been told that 
 the IPsec tunnel will fragment the traffic b/c it will not copy the DF 
 bit from the original packet once it is encapsulated, however, I 
 cannot ping through the tunnel with large packet sizes and the DF bit 
 set. I've found a lot of information and have worked a lot with 
 fragmentation, but can't find anything on this exact type of scenario.



 Thanks in advance for any input or information.



 Sincerely,

 Terry



 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net 
 https://puck.nether.net/mailman/listinfo/juniper-nsp

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp