Chapter 12 – Hardware Acceleration

Example

You could configure the offloading of encryption and decryption for an IPsec SA that was sent to the network processor.

config system npu

set enc-offload-antireplay enable set dec-offload-antireplay enable set offload-ipsec-host enable

end

 

Disabling NP acceleration for individual IPsec VPN phase 1s

Use the following command to disable NP offloading for an interface-based IPsec VPN phase 1:

config vpn ipsec phase1-interface edit phase-1-name

set npu-offload disable

end

Use the following command to disable NP offloading for a policy-based IPsec VPN phase 1:

 

config vpn ipsec phase1 edit phase-1-name

set npu-offload disable

end

The npu-offload option is enabled by default.

 

Disabling NP offloading for unsupported IPsec encryption or authentication algorithms

In general, more recent IPsec VPN encryption and authentication algorithms may not be supported by older NP processors. For example, NP4 network processors do not support SHA-256, SHA-384, and SHA-512. IPsec traffic with unsupported algorithms is not offloaded and instead is processed by the FortiGate CPU. In addition, this configuration may cause packet loss and other performance issues. If you experience packet loss or performance problems you should set the  npu-offload option to disable. Future FortiOS versions should prevent selecting algorithms not supported by the hardware.

 

Disabling NP offloading for firewall policies

Use the following options to disable NP offloading for specific security policies: For IPv4 security policies.

config firewall policy

edit 1

set auto-asic-offload disable end

For IPv6 security policies.

 

config firewall policy6 edit 1

set auto-asic-offload disable end

For multicast security policies.

 

config firewall multicast-policy edit 1

set auto-asic-offload disable end

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.