Configure the IPsec packet format or forwarding behavior to implement QoS for IPsec packets.
The system view is displayed.
Run the ipsec global df-bit clear command to clear the DF flag to allow IPsec packet fragmentation.
Run the ipsec global fragmentation before-encryption command to enable the device to fragment and then encrypt IPsec packets.
Fragmentation before encryption can be configured globally or locally:
Global configuration
The global configuration is valid to all created IPsec policies (except for policies in which this is separately configured). You can use the global configuration to improve efficiency. If a large number of IPsec policies need to use this function, you do not need to run the ipsec df-bit clear command to manually configure this function for IPsec policies one by one.
Local configuration
For a specific IPsec policy, you can run the ipsec df-bit clear command to separately configure this function. The local configuration takes precedence over the global configuration.
The configuration is committed.
The system view is displayed.
Step/Item |
IPsec Policy |
IPsec Policy Template |
---|---|---|
1. Enter the IPsec policy view or IPsec policy template view. |
ipsec policy policy-name sequence-number |
ipsec policy-template template-name sequence-number |
2. Set a rate limit. |
Run the speed-limit { inbound | outbound } speed-limit [ ike ] [ payload ] command to set a rate limit. When multiple tunnels are established on the device, traffic conflict occurs in case of heavy traffic. By running the speed-limit command, you can limit the traffic on each IPsec tunnel. The traffic beyond the limit is discarded. In this manner, traffic on each tunnel can be transmitted. |
|
3. Configure the device to fragment and then encrypt IPsec packets. |
NOTE:
For the IPsec policies, the ipsec df-bit clear command takes precedence over the ipsec global df-bit clear command in the system view. |
|
4. Configure the priority re-marking function. |
|
|
6. Define a policy template. |
- |
ipsec policy policy-name seq-number isakmp [ template template-name ] After the IPsec policy template is bound to the IPsec policy, you can apply the IPsec policy to the interface to enable functions of the IPsec policy template. NOTE:
In an IPsec policy group, only one IPsec policy can quote the IPsec policy template. The names of the IPsec policy template and the IPsec policy must be different. |
The configuration is committed.
Configure the IPsec packet mirroring.
Run the system-view command to enter the system view.
Run the interface interface-type interface-number command to enter the interface view.
Run the port-observing observe-index observe-index command to configure the observing port.
Run the quit command to return to the system view.