VPN QOS Design

I am currently looking into the design of a VPN over the internet with QOS for video and voice using ASA and 2811 routers.  Does anyone have stories or the configurations of the sample that I could look at to see if there is still a possibility?

Thank you

As explained in http://supportforums.cisco.com/docs/DOC-1230 you use DSCP corresponding traffic, that have priority and the rest police you.

You can also train the rest of the traffic rather than the police.

He explained in the link provided.

PK

Tags: Cisco Security

Similar Questions

  • Protection of IPSEC Tunnel and tunnel QOS shaping does no formatting.

    I have an implosion of the little brain as to why it won't work.

    I tried the QOS policy on tunnel interfaces and the ATM interface. No formatting occurs. Interfaces to transmit at their leisure.

    Please can someone have a better day me to tell me what I am doing wrong?

    Here is the config relevant (and standard). without the political order applied anywhere. Any help appreciated.

    ---------------------------------------------------------------------------------

    class-map correspondence-everything APPSERVEURS
    match the name of group-access TERMINALSERVERS
    class-map correspondence-any VOICE
    sip protocol game
    match Protocol rtp
    match dscp ef
    !
    !
    Policy-map QOSPOLICY
    class VOICE
    priority 100
    class APPSERVEURS
    33% of bandwidth
    class class by default
    Fair/salon-tail 16
    Policy-map of TUNNEL
    class class by default
    form average 350000
    QOSPOLICY service-policy
    !
    !
    interface Tunnel0
    bandwidth 350
    IP 172.20.58.2 255.255.255.0
    IP mtu 1420
    load-interval 30
    QoS before filing
    source of Dialer0 tunnel
    destination tunnel X.X.X.X
    ipv4 ipsec tunnel mode
    tunnel path-mtu-discovery
    Tunnel IPSECPROFILE ipsec protection profile
    !
    Tunnel1 interface
    bandwidth 350
    IP 172.21.58.2 255.255.255.0
    IP mtu 1420
    load-interval 30
    delay 58000
    QoS before filing
    source of Dialer0 tunnel
    destination tunnel Y.Y.Y.Y
    ipv4 ipsec tunnel mode
    tunnel path-mtu-discovery
    Tunnel IPSECPROFILE ipsec protection profile
    !
    !
    ATM0/0/0 interface
    no ip address
    load-interval 30
    No atm ilmi-keepalive
    !
    point-to-point interface ATM0/0/0.1
    PVC 0/38
    aal5mux encapsulation ppp Dialer
    Dialer pool-member 1
    !
    !
    interface Dialer0
    bandwidth 400
    the negotiated IP address

    ---------------------------------------------------------------------------------------------------------

    Thank you

    Paul

    Paul,

    One of the reasons could be because of the VTI overload.

    That being said I don't know which is the way to go with your QoS:

    https://Tools.Cisco.com/bugsearch/bug/CSCsz63683/?reffering_site=dumpcr

    My suggestion: give it a try with 15.2 M/T and prosecute TAC with discount people rather than VPN QoS ;-)

    M.

  • Balancing of VMware with Nexus 1000v

    With the vmware puts vDS or vSS, I see many designs use the asset-liability approach for binding rising consolidation of NETWORK cards, IE a vmnic is active will fabric and a vmnic is passive will fabric B. This setting is configured in vSphere.

    Se this article: http://bradhedlund.com/2010/09/15/vmware-10ge-qos-designs-cisco-ucs-nexus/

    Is this correct, that we can put in place a regime with the 1000V? All the network is on the 1000V config, and as far as I know, we can only configure the uplink in these 3 modes:

    1. LACP 2. vPC-Host Mode 3. vPC-Host Mode Mac pinning

    and they are all 'active' based.

    Post edited by: Atle Dale

    Yes.  All uplinks are used.  Each VM virtual interface is pinned to one of of the uplinks.  If one uplink goes down, all interfaces pinned gets dynamically likes to remaining uplinks.  A mac address will only see on a single interface at a time.  This is how MAC pinning prevents STP loops.

    Robert

  • Difference of RV and ASA series

    Hello

    I intend to build a tunnel vpn site-to-site connection of 2-3 satellite office and the main office.

    After searching the product, I don't really understand the difference between the models like the ASA5505 and RV042

    Can I need to use ASA5505 Office main RV042 while in the offices of smoking?

    Or can I use RV042 (or higher) in the office and just as the vpn tunnel?

    If this is the case, what is the advantage of the ASA over the RV series series?

    Thank you for answering my stupid question, I am very new to cisco products.

    Kind regards

    Peter

    In a Word, ASA5505 is an enterprise-class security apparatus, while the RV Show is the VPN routers designed for small businesses.

    ASA supports CLI, while the RV series rely on web browsers for administrative tasks.

  • Double firewall, config VPN design question?

    All,

    I'm looking to implement a design of double firewall with different suppliers, i.e. Cisco at the front and another seller behind that. The Cisco ASA will manage the ends of the VPN. It's a design recommended to us.

    The reason was the front towards the firewall (cisco) will block most of the noise, and then the second firwall will make inspection of the IPS etc. Apparently, this is also done incase there are vulnerabilities with the first provider. The DMZ interface will in fact come the second firewall.

    I am currently working, what if all remote users terminate their VPN at the edge of the ASAs, what is the best way have to move towards the second firwall, then again on the internet so we can apply the policy to users / and inspection?

    There are no facilities on the front to ASAs IPS inspection, just a bog without visibility L7 stock Firewall (as this responsibility will lie with the second firewall).

    Looking for information so that I can start looking...

    The MCV is a great place to start.

    http://www.Cisco.com/en/us/solutions/ns340/ns414/ns742/ns1128/landing_iEdge.html

  • Best design solution VPN for Central/branches

    Hi all

    I would like your comments on the design of a VPN account solution required the following:

    Right now, the customer has a single office. I will be putting in place of a Cisco 1811w for them, and its main functions will be wireless, firewall with CBAC and EZVPN server access.

    Server EZVPN function will be carried out so that employees with laptops can work from home.

    In the near future, there will be about 4 branches in operation.

    Static IP address is available for the main office, but I'm not sure if the static IP will be available for the office once they are established (there are 50 / 50 chance).

    There will be an Active Directory server in the central location and will be accessible from the branches.

    My question is - given the uncertainty in the branches having a static IP - what is the best way to implement the VPN to connect them to the branch?

    Each branch will have an installed Cisco 831.

    Is EZVPN a viable, given the above requirements?

    Is it possible to put in place the 831 as customers without XAUTH EZVPN, all keeping XAUTH for employees using EZVPN clients?

    If this does not work, XAUTH might have to.

    Or, given the situation, you would opt for DMVPN... Unfortunately I do not know too much about it as the technology for now... What are the advantages / disadvantages of its use, if it is an appropriate solution to this scenario?

    Thank you all in advance for your comments!

    Sean

    I think that you need to use a mode of expansion of network (configured in the vpngroup) instead of client mode. Just make sure that each office uses a different and not overlapping address space.

  • VPN design tips

    I usually deal with issues of LAN/WAN, but have very little experience with the design of the VPN. I would like to know if I have the right idea or if there is a better solution to target.

    Scenario:

    There is a staff with two remote offices. Remote offices have 10 to 20 people each with little or no planned growth and different firewall solutions. HQ has 40-50 people anticipating exceptional growth and a PIX 515E. The manager would like to remote offices and remote access VPN site to site VPN for the traveler. His biggest concern is the speed through the site to site tunnels.

    My solution:

    Place a hub routers of the 800 series with sets of features VPN and firewalls and VPN 3005 behind the PIX to HQ in remote controls.

    This seems sufficient? Other recommendations?

    No I don't think so. This should be good only for the 515.

  • QoS and routing VPN IPSEC protocols

    Hello world

    You must confirm if the QOS is usable on IPSEC Site to site VPN?

    IPSEC VPN it can also participate in routing protocols.

    Example of

    An address 192.168.10.1 site source

    B Source 192.168.10.2 site address

    Now for Site A to Site B IPSEC to join a way is that we can use our ISP as static IP address

    Site has

    192.168.10.2 255.255.255.0 address 10.x.x.x ISP

    Using routing protocols

    Is it possible to use OSPF between two sites and advertise routes in OSPF?

    Will they see each other as ospf neis?

    Thank you

    MAhesh

    Hello Manu,

    Yes, we can do,

    Let me provide you with the following information:

    On the quality of service

    http://www.Cisco.com/en/us/products/ps6120/products_configuration_example09186a008080dfa7.shtml

    On OSPF

    http://www.Cisco.com/en/us/products/HW/vpndevc/ps2030/products_configuration_example09186a00804acfea.shtm

  • VPN - question of General design for a ut of a router tunnel more

    Hello

    We have a router that has VPN connections with different partners of our company. VPN remote access were used on computers that are connecting to the different partners of our company.

    There has been problems of this kind, that is to say put on both a watchdog and a customer vpn cisco router led to blue-screens on the PC.

    The current idea is to put different tunnels from site to site on the router (default gateway of PC clients that connect to the partners). My question is... How our PC to get DHCP addresses on networks of visitors, once the tunnels are up? I guess I'm alittle confused about the address for the PC on our side how will work.

    Thanks for your help.

    Divide the pool of ip from the internal network, you're going to visit. for example the document below will be exaplain the same configuration in user mode.

    http://www.Cisco.com/en/us/products/HW/vpndevc/ps2030/products_configuration_example09186a00806ab788.shtml

  • Design site to Site VPN w/NAT traversal issue

    Hi, I have a number of site to site VPN that end on a PIX. I intend to migrate these VPN to a router that sits on a demilitarized zone connected to the PIX. Before doing that I'm going to set up a private network new virtual to end on the router but I also need than VPNS that end on the PIX to be not affected.

    If I configure NAT traversal on the PIX, affected my other VPN?

    Thanks in advance

    DOM

    Hi Dom,

    Why do you want to configure NAT-Traversal on PIX, if you wish to terminate your VPN router (which is on the DMZ).

    Do you do any NAT on PIX thru the router?

    If you want to configure NAT-Traversal, it must be configured on the end (on the router in your case) devices.

    Example:

    When a user with Cisco client or Cisco router behind NAT wants to connect to another device (such as PIX, ASA, or router) NAT - T must be configured on the machine (which will be the PIX or ASA)

    Hope that helps.

    * Please indicate the post

  • Redundant VPN design

    Hi all

    I need a solution for this implementation:

    2 sites

    2 internet connections each site (different suppliers)

    1 ASA in each site

    I need a config that allows me to have redundant VPN connections from one site to the other. I need to have a VPN using the, say, internet connection A of site 1 and internet connection from site 2 and if the internet connection A of site 1 goes down the VPN connect by using the internet connection B from site 1 to site 2 A internet connection. This must be done without user intervention.

    If I can't do it with the ASA which can use to achieve this scenario? Another router (2900), a kind of load balancing?

    I would like to use the ASA because I have a lot of inbound NAT configured and keeping addresses public IP on the SAA outside interface would be great.

    Thank you, best regards.

    Yes.

    You can apply the same card encryption on both interfaces.

    Also... If you have multiple VPN peers, they end on the same card encryption as well.

    If you for example need many VPN Site to Site tunnels, you create a single card encryption with sequence numbers different to accept VPN connections.

    Federico.

  • Design VPN recommendation

    I'm standing, a site with an L2L connection, but needs to vpn client host connections as well. I know that you can do with old good crypto cards, but it is not the preferred method these days with the virtual Tunnel Interfaces? Trying to figure out the best method to deal with. Links and guidance appreciated.

    Hi Robert,.

    To be honest, today the best recommendation is to run AnyConnect instead of the legacy IPsec client.

    In the case where you would need to run the IPsec client, it doesn't really matter if you use a virtual interface or not, given that from the point of view of the VPN client functionalilty is the same.

    I would recommend simple card crypto for a simple connection to a router not to treat many types of VPN as DMVPN, VTI, DVTI connections, etc.

    However, if you want to get more familiar with DVTI, then I suggest this link:

    Cisco Easy VPN with IPSec configuration dynamic Tunnel Virtual Interface (DVTI)

    Remember that the configuration of a box of equipment or software is pretty much the same thing on the VPN server.

    With a card encryption:

    Router allows the VPN Clients to connect to IPsec and Internet using Split Tunneling Configuration example

    So as you can see the configuration of the client is the same on the server:

    crypto isakmp client configuration group vpngroup key cisco123 dns 10.10.10.10 wins 10.10.10.20 domain cisco.com pool ippool acl 101

    What really changes is to use if a card encryption or a VTI.

    It will be useful.

    Portu.

    Please note all useful posts

    Post edited by: Javier Portuguez

  • Design of VPN L2L ASA question

    We expect to have more than 10,000 remote VPN L2L clients.

    I see that each crypto card needs a statement of 'same game' and the IP address is the address of the remote peer VPN L2L.

    :

    EX:

    card encryption UNI-POP 3 set peer 172.23.0.3

    : . . .

    card crypto UNI-POP 10000 set peer 172.26.0.250

    :

    I already feel that this will be a VERY long config, maybe too big to save/read/from memory.

    :

    Anyone would be a better approach?

    Thank you

    Frank

    Frank,

    If the remote end will run only from time to time, you should not have set peer statements and normally it would suffice to have a dynamic encryption card.

    If the remote ends do not support certificates, it is possible to land on defaultl2l tunnel-group.

    bsns-asa5505-19# sh run all tunnel-group

    tunnel-group DefaultL2LGroup type ipsec-l2l

    tunnel-group DefaultL2LGroup general-attributes

    (...)

    You need to test yourself to see if it will work.

    I also agree in terms of more than one firewall. With devices for two in the load balancing or if possible 2pairs of devices in the failover cluster could be great way to have a decent charge by machine and equipment redundancy (ideal circumstances]);. I suggest you ping your system engineer for sure any deployment involving 5585, guys can usually give good advice (and discounts;]).

    Marcin

  • Failover of VPN for data/VoIP through ASA 5520 or 7204 VXR

    I would like to install a VPN failover for my remote sites using broadband 3dn/1up.  They are mainly 2800 routers.    I like options for end hub a pair of Cisco ASA active / standby and a 7204 VXR.  Voice and data will travel down the VPN failover and I intend to have QOS/Traffic shaping in place to better meet the needs for VoIP as possible.  I need to do it on about 150 sites. My questions are:

    1. What is the best why the ASA or the 7204

    2 Will VoIP packets pass through the two in the same way

    3 as far as redistributing routes can I use GRE on an ASA or should I keep all static. NH on the SAA is an L3 switch.

    4. an ASA with 100 mg of bandwithd through metro E supports 150 tunnels making VoIP and data. 1 to 3 calls per site max.

    Thank you

    J R

    To answer your questions: -.

    1. who is better for this, the ASA or the 7204 - ASA, is what is designed to do.

    2 packages VoIP Will cross both the same way - Yes

    3 as far as redistributing routes can I use GRE on an ASA or should I keep all static. NH on the SAA is an L3 switch. -l'ASA does not support GRE tunnels.

    4. an ASA with 100 mg of bandwithd through metro E supports 150 tunnels making VoIP and data. 1 to 3 calls per site max. -It depends on the model of the SAA, see the below matrix for thru-put http://www.cisco.com/en/US/products/ps6120/prod_models_comparison.html

    HTH >

  • Cisco VPN Client causes a blue screen crash on Windows XP Pro (Satellite M30)

    Hello

    I have a Satellite Pro M30 running Windows XP Professional.

    After you start a vpn Tunnel via a customer of Cisco VPN (Version 4.6 and 4.7), the system crashes with a blue screen.

    I see that the key exchange is successful, but immediately after the vpn connection is established Windows XP crashes with a blue screen.

    Someone has any idea how to solve this problem?

    Perhaps by the updated device driver? And if so, which driver should be updated?

    Kind regards

    Thorsten

    Hello

    Well, it seems that the Cisco client is a problem.
    I m unaware of this product because it of not designed by Toshiba.
    I think that the drivers are not compatible with the Windows operating system.
    However, I found this site troubleshooting cisco vpn client:
    Please check this:
    http://www.CITES.uiuc.edu/wireless/trouble-index.html

Maybe you are looking for