11-04-2003 06:47 AM - edited 02-20-2020 11:04 PM
Hi,
I have a PIX 506 with a 3DES tunnel to a PIX 501. I would like VoIP traffic to tunnel without encryption or at least less encryption.
I was thinking about using tunnel interfaces(i've created 'int tunnel 0' on 2600/1700 routers in the past) because I thought I these could tunnel w/out encrypting data, but is this possible to create tunnel interfaces on PIX's? Also, which ACLs get processed first, IPSec tranform set ACL or tunnel interface ACL?
If the above is not possible can I create a second instance of my 3DES crypto map using a different transform set that has just DES or no encryption associated with them? For that second instance of the crypto map I would obvoiusly just be matching VoIP traffic on it's transform set's ACL.
Please give me some direction.
Thanks,
Mike
11-10-2003 08:53 AM
I am aware that VPN clients support split tunneling which allows Internet destined traffic to be sent unencrypted directly to the Internet. However I am not very sure if this is possible with the PIX.
12-18-2003 04:38 PM
As you say GRE tunnels are not supported on the Pixes, and the problem with GRE tunnels is that anything you slam down the tunnel gets encrypted anyway.
I think you're on the right track about creating a crypto-map for your VOIP traffic and using an ESP-Null transform-set. Some smart Cisco folks should be able to give you some ideas on throughput using esp-null. The advantage is too, tha althous it isn'e encrypted, it is encapsulated so you still get VPN capability.
01-29-2004 04:51 PM
Anything you slam down the tunnel gets encrypted, BUT it doesn't get inspected by the Pix's if your tunnel endpoints are beyond them.
I reduced my latency almost 40% by doing that along with QoS.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide