19.07.2013 Views

Enterprise QoS Solution Reference Network Design Guide

Enterprise QoS Solution Reference Network Design Guide

Enterprise QoS Solution Reference Network Design Guide

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 6 IPSec VPN <strong>QoS</strong> <strong>Design</strong><br />

Prefragmentation<br />

Version 3.3<br />

Figure 6-6 IPSec and cRTP Incompatibility<br />

IPSec<br />

Crypto<br />

Engine<br />

Bandwidth Provisioning<br />

!@#! $#@<br />

!@#!<br />

Configured<br />

Queuing<br />

Huh?<br />

!@#!<br />

Identify RTP<br />

Traffic<br />

RTP<br />

Traffic<br />

RTP<br />

Compressor<br />

Non-RTP<br />

Traffic<br />

The RTP compression engine cannot identify the stream as RTP,<br />

(since it has been encrypted) and, thus, cannot compress the stream.<br />

Site-to-Site V3PN <strong>QoS</strong> Considerations<br />

Compress RTP<br />

Traffic<br />

Transmit<br />

Queue<br />

It is important to recognize that cRTP functions on a hop-by-hop basis, whereas IPSec can span multiple<br />

intermediate (Layer 3) hops between IPSec endpoints. This distinction further exacerbates<br />

incompatibility between the features.<br />

Although developments are under way to address these incompatibilities, at the time of this writing,<br />

cRTP cannot be utilized to achieve bandwidth savings in an IPSec VPN environment.<br />

A problem arises when a packet is nearly the size of the maximum transmission unit (MTU) of the<br />

outbound link of the encrypting router and then is encapsulated with IPSec headers. The resulting packet<br />

is likely to exceed the MTU of the outbound link. This causes packet fragmentation after encryption,<br />

which makes the decrypting router reassemble in the process path.<br />

Cisco IOS Release 12.2(13)T introduced a new feature: prefragmentation for IPSec VPNs.<br />

Prefragmentation increases the decrypting router’s performance by enabling it to operate in the<br />

high-performance CEF path instead of the process path.<br />

This feature enables an encrypting router to predetermine the encapsulated packet size from information<br />

available in transform sets, which are configured as part of the IPSec security association. If it is<br />

predetermined that the packet will exceed the MTU of the output interface, the packet is fragmented<br />

before encryption. This function avoids process-level reassembly before decryption and helps improve<br />

decryption performance and overall IPSec traffic throughput.<br />

Prefragmentation for IPSec VPNs is enabled globally by default for Cisco VPN routers running Cisco<br />

IOS Release 12.2(13)T or higher.<br />

Chapter 1, “Quality of Service <strong>Design</strong> Overview,” presented the 33 Percent LLQ Rule, along with the<br />

design rationale behind the recommendation. Furthermore, the rule was expressed as a conservative<br />

design recommendation that might not be valid under all constraints. Provisioning for VoIP over IPSec<br />

on slow links sometimes poses constraints that might preclude applying the 33 Percent LLQ Rule.<br />

!@#!<br />

!@#! !@#!<br />

<strong>Enterprise</strong> <strong>QoS</strong> <strong>Solution</strong> <strong>Reference</strong> <strong>Network</strong> <strong>Design</strong> <strong>Guide</strong><br />

6-9

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!