19.07.2013 Views

Enterprise QoS Solution Reference Network Design Guide

Enterprise QoS Solution Reference Network Design Guide

Enterprise QoS Solution Reference Network Design Guide

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Site-to-Site V3PN <strong>QoS</strong> Considerations<br />

Pre-Encryption Queuing<br />

6-14<br />

Figure 6-10 <strong>QoS</strong> Pre-Classify Feature Operation<br />

Packet<br />

Input Interface<br />

Crypto Engine<br />

clone<br />

particle1<br />

particle2<br />

particleN<br />

<strong>Enterprise</strong> <strong>QoS</strong> <strong>Solution</strong> <strong>Reference</strong> <strong>Network</strong> <strong>Design</strong> <strong>Guide</strong><br />

A clone of the original packet headers<br />

is created and associated with the<br />

encrypted particles.<br />

%$#*&1<br />

%$#*& 2<br />

%$#*& N<br />

clone<br />

class-map NET-MGMT<br />

match access-group 123<br />

Output Interface<br />

!<br />

access-list 123 permit tcp any host 10.45.15.1 eq telnet<br />

<strong>QoS</strong> Pre-Classify allows for advanced classification (beyond ToS byte values)<br />

such as source/dest IP addrs, Layer 4 protocols, and source/dest port numbers.<br />

Encrypted Packet<br />

Chapter 6 IPSec VPN <strong>QoS</strong> <strong>Design</strong><br />

<strong>QoS</strong> classification is performed<br />

against the clone (as the original<br />

packet’s headers are encrypted).<br />

A key point to remember regarding <strong>QoS</strong> Pre-Classify is that it is applicable only at the encrypting<br />

router’s output interface. The fields preserved by <strong>QoS</strong> Pre-Classify are not available to any routers<br />

downstream; the clone never leaves the router performing the encryption, thus ensuring the integrity and<br />

security of the IPSec VPN tunnel.<br />

<strong>QoS</strong> Pre-Classify is supported in all Cisco IOS switching paths and is recommended to be enabled on<br />

some platforms even when only the ToS byte values are being used for classification. Testing has shown<br />

that when hardware-based encryption cards are combined with <strong>QoS</strong>, the Cisco IOS Software<br />

implementation of the <strong>QoS</strong> Pre-Classify feature slightly enhances performance, even when matching<br />

only on ToS byte values. Furthermore, enabling <strong>QoS</strong> Pre-Classify by default eliminates the possibility<br />

that its configuration will be overlooked if the <strong>QoS</strong> policy later is changed to include matching on IP<br />

addresses, ports, or protocols.<br />

<strong>Design</strong> recommendations for the <strong>QoS</strong> Pre-Classify feature can be summarized as follows:<br />

Enable <strong>QoS</strong> Pre-Classify on all branch IPSec VPN routers that support the feature.<br />

Enable <strong>QoS</strong> Pre-Classify on headend IPSec VPN routers only when both the VPN termination and<br />

<strong>QoS</strong> policies reside on the same device.<br />

The hardware crypto engine within a Cisco VPN router’s chassis can be viewed as an internal interface<br />

that processes packets for encryption or decryption.<br />

Before Cisco IOS Release 12.2(13)T, packets to be encrypted were handed off to the crypto engine in a<br />

first-in-first-out (FIFO) basis. No distinction was made between voice packets and data packets. The<br />

FIFO queuing for crypto engines is illustrated in Figure 6-11.<br />

Version 3.3

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!