08-30-2017 11:15 PM - edited 03-10-2019 12:53 AM
Hi.
For example: we attach crypto map on interface.
Will there be any change in the processing of incoming non-esp (and also non-ike) packets?
Сan somebody explain in detail how the router detects interesting IPSec traffic in the outbound direction, this is just ACL check?
Solved! Go to Solution.
09-01-2017 05:36 AM - edited 09-01-2017 05:39 AM
That's easy -
1. No
2. Yes. (for initial packets - once the VPN is established with active connections, I believe they will match the existing connections check prior to ACL processing.)
:)
09-01-2017 05:36 AM - edited 09-01-2017 05:39 AM
That's easy -
1. No
2. Yes. (for initial packets - once the VPN is established with active connections, I believe they will match the existing connections check prior to ACL processing.)
:)
09-01-2017 05:51 AM
Do you belive, or do you now?
I belive that ASA does so, but not sure that so does the router.
Just for example, we have router with 200 Mbps real life traffic on interface gi 0/0 and we have 50% utilization of cpu in this case.
And another case: we have router with 200 Mbps real life traffic on interface gi 0/0 + crypto map with 3 Mbps encrypted traffic. What processor utilization will be in this case?
09-01-2017 05:56 AM
Sorry - I mistakenly assumed you were asking about a firewall.
Router CPU is definitely affected by having to encrypt traffic. It still doesn't change the order of operations for non-IPsec traffic though.
09-01-2017 06:50 AM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide