some other folks had some good things to say in response. I just wanted to
add an experience I had that I was pretty much able to verify in my lab as
well as on a customer network.

Customer ran IPX on their network. For particular locations, the cost of
frame relay was hideous, so we proposed a VPN. We tunneled IPX through a GRE
tunnel with IPSEC 3DES. Connectivity was fine. I saw all routes. We could
ping the routers throughout the network ( IP was enabled on all routers for
remote management ) I saw all IP routes and all IPX routes. IPX pings and IP
pings router to router worked fine.

But the customer workstations could not log on to the IPX servers, let alone
do any work.

Drove me nuts. We had TAC cases open, we had some vendor involvement for
Novell and for PCAnywhere, which the customer used to distribute their
application. I believe I even had a thread going here on the issue.

When I did some testing in my home lab, mimicking the customer network, I
found a number of problems when I would do IPX and IP pings using a 1500
byte packet, but the problems disappeared when I used a 1499 byte packet
size. Go figure.

I also know that using my employer's VPN ( Cisco VPN client connecting to a
CVPN box ) that there was a problem with a particular application ( it would
not work over the VPN, but worked fine when I was in the office ) that was
solved by reducing the MTU for the VPN connection ( setting on the Cisco VPN
client software ) from the default to about 600 bytes.

So, whether it is logical or not, it would seem that connections over IPSEC
tunnels can be positively or adversely effected by MTU size.

There is probably a good reason for this. Maybe counting on my fingers, all
the headers, payloads, etc would yield an answer.

But MTU definitely can contribute to problems over IPSEC.


Chuck
--

www.chuckslongroad.info
like my web site?
take the survey!



""Thomas N.""  wrote in message
[EMAIL PROTECTED]">news:[EMAIL PROTECTED]...
> Hi All,
>
> I am setting up a site-to-site VPN between 2 LANs using Cisco IOS VPN
(Cisco
> 2600 routers).  I could get the tunnel up and running between the two LANs
> with IPSec over GRE so that I can run EIGRP.  Data transfer between 2 LANs
> across the tunnel looks OK, and all dynamic routes learned with EIGRP.
> However, a problem come up when I put a Proxy Server on the first LAN and
> force Internet traffic from workstations from the second LAN to go out
with
> this Proxy server.  Workstations from the second LAN could browse Internet
> across the tunnel to reach the Proxy server then hit the Internet;
however,
> the performance is very poor (seem like browsing over a 56k modem).  I am
> thinking this may be because of fragmentation on the 2 routers.  Is there
> any work around for this issue?  If MTU size needs to be adjusted, what
> would be the ideal MTU size for IPSec over GRE tunnel in "tunnel" mode?
> Again, thank you All for the help!
>
> Thomas N.




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=54666&t=54634
--------------------------------------------------
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

Reply via email to