RE: VoIP over IPsec

2003-02-17 Thread Charles Youse

So do you suppose that in my scenario, I'd be better off leaving the VoIP out of the 
encrypted tunnels and use a separate [cleartext] path for them?

I'm worried about the security implications, not because I feel there is a huge 
security risk but because I'm sure the topic will be brought up.  (Communicating over 
one provider's backbone provides little opportunity for third parties to snoop packets 
between points, of course.)  

Has the issue of VoIP security ever been addressed?  I suppose I should really do my 
homework.

C.  

-Original Message-
From: Stephen Sprunk [mailto:[EMAIL PROTECTED]]
Sent: Monday, February 17, 2003 1:22 PM
To: Charlie Clemmer
Cc: [EMAIL PROTECTED]
Subject: Re: VoIP over IPsec



Thus spake Charlie Clemmer [EMAIL PROTECTED]
 Stephen, I know this is outside of Charles' original inquiry, but I'm not
 familiar with this qos pre-classify feature. Since we would be
encrypting
 voice traffic ... at what point would you classify it? If I classify it
 before it goes into the tunnel and gets encrypted, would that
 classification last once it's encrypted? If we try to classify after it's
 been encrypted, how can we tell it's voice traffic? It seems to me that
 jitter from both the actual encryption process as well as that associated
 with basic serialization would be the potential death of VoIP in this
 scenario, but I'm not sure mechanisms available to help resolve that risk.

In the default IOS code path, encryption happens before QOS (and after GRE).
Modern IOS versions copy the DSCP when encapsulating/ encrypting packets, so
DSCP-based QOS will still work, but IP- and port-based QOS will not.

More importantly, encryption is slow; even hardware encryption is
significantly slower than the rest of the forwarding process.  It's also
FIFO by default, meaning that large data packets can get stuck ahead of your
VoIP packets, causing jitter.

'qos pre-classify' adds a second QOS stage before encryption, which allows
you to classify packets in their unencrypted state and, more importantly,
adds PQ capability to the encryption stage.

For more information:
http://www.cisco.com/univercd/cc/td/doc/product/software/ios122/122cgcr/fqos
_c/fqcprt1/qcfvpn.htm

S

Stephen Sprunk God does not play dice.  --Albert Einstein
CCIE #3723 God is an inveterate gambler, and He throws the
K5SSSdice at every possible opportunity. --Stephen Hawking




RE: VoIP over IPsec

2003-02-17 Thread Charles Youse

Using hardware encryption with the qos pre-classify feature, I imagine that jitter 
will no longer be an issue - (that is, the jitter you mention previously is introduced 
by the lack of prioritization into the encryption queue).  Or am I missing something?

C.

-Original Message-
From: Stephen Sprunk [mailto:[EMAIL PROTECTED]]
Sent: Monday, February 17, 2003 2:24 AM
To: Charles Youse
Cc: [EMAIL PROTECTED]
Subject: Re: VoIP over IPsec


Thus spake Charles Youse [EMAIL PROTECTED]
 In order to cut costs in our telecom budget I'm toying with the idea
 of replacing a lot of our inter-office leased lines with VPN
 connections over the public Internet.  [...]
 Assume for the moment that latency and bandwidth are not an issue;
 e.g., any two points that will be exchanging voice data will both have
 transit from the same provider with an aggressive SLA.

Latency, bandwidth, and packet loss are moot.  Jitter is VoIP's enemy.

 Does anyone have any experience running VoIP over such tunnels?
 Is there a technical reason why this solution is not feasible?  Are
 Cisco routers not happy doing VoIP/IPsec/GRE in concert?

IPsec itself will not cause you problems; there's no theoretical conflict.

Unfortunately, IOS can introduce jitter when encrypting packets.  To
mitigate this, you can apply QOS, with a strict priotiy queue for the VoIP
packets and the qos pre-classify feature.  Your mileage will vary
depending on the CPU power of the router, the traffic levels, and whether
you're using hardware encryption.

S

Stephen Sprunk God does not play dice.  --Albert Einstein
CCIE #3723 God is an inveterate gambler, and He throws the
K5SSSdice at every possible opportunity. --Stephen Hawking




RE: VoIP over IPsec

2003-02-17 Thread Charles Youse

Because you need to use GRE to create a virtual interface on the router and thus 
enable the use of routing protocols.  At least, that's the only way I know how to do 
it.

C.

-Original Message-
From: Iljitsch van Beijnum [mailto:[EMAIL PROTECTED]]
Sent: Monday, February 17, 2003 6:19 PM
To: Steve Feldman
Cc: [EMAIL PROTECTED]
Subject: Re: VoIP over IPsec



On Mon, 17 Feb 2003, Steve Feldman wrote:

 through the corporate enterprise net, Cisco routers with IPSEC/GRE tunnels
 over the public Internet.

Maybe a stupid question... why would you need GRE tunneling while IPsec
has a tunnel mode of its own?




VoIP over IPsec

2003-02-16 Thread Charles Youse

Hello again,

I've heard a lot of encouraging things on this list in response to my previous 
inquiries about VoIP - hoping you can help me out again.

In order to cut costs in our telecom budget I'm toying with the idea of replacing a 
lot of our inter-office leased lines with VPN connections over the public Internet.  
(I've got a lot of experience doing this in major production environments so I'm aware 
of the gotchas in this scenario.)  My general method is to create IPsec-encrypted GRE 
tunnels between sites and then treat them as true virtual circuits; i.e., I run OSPF 
over the tunnel and exchange dynamic routing information, blah-de-blah.

Assume for the moment that latency and bandwidth are not an issue; e.g., any two 
points that will be exchanging voice data will both have transit from the same 
provider with an aggressive SLA.

Does anyone have any experience running VoIP over such tunnels?  Is there a technical 
reason why this solution is not feasible?  Are Cisco routers not happy doing 
VoIP/IPsec/GRE in concert?

Thanks as always,
C.



Voice over IP - performance

2003-02-12 Thread Charles Youse

Does anyone have any real-world figures for VoIP performance on various platforms?  In 
other words, how many calls can an otherwise unused e.g., Cisco 2600 be expected to 
handle if it's the conversion point from trunked voice calls to IP.  Some rough 
numbers for different codecs on different hardware would be very useful.  Most 
specifically I'm interested in Cisco router platforms but other vendor stats would be 
appreciated as well.

Off-list replies please; if anyone is interested in the results I will condense the 
responses and post back to the list.

Thanks,
C.





RE: Voice over IP - performance

2003-02-12 Thread Charles Youse

I'm assuming in the case of, e.g., a 2650 + dual T-1 PRI interface can actually 
encode/decode 48 simultaneous g729a voice streams without issues?  Any idea what the 
CPU utilisation is - or is this handled in separate DSPs in the voice network module 
itself?

C.

-Original Message-
From: Bill Woodcock [mailto:[EMAIL PROTECTED]]
Sent: Wednesday, February 12, 2003 2:43 PM
To: Charles Youse
Cc: [EMAIL PROTECTED]
Subject: Re: Voice over IP - performance


 Does anyone have any real-world figures for VoIP performance on
 various platforms?  In other words, how many calls can an otherwise
 unused e.g., Cisco 2600 be expected to handle if it's the conversion
 point from trunked voice calls to IP.  Some rough numbers for
 different codecs on different hardware would be very useful.  Most
 specifically I'm interested in Cisco router platforms but other
 vendor stats would be appreciated as well.

Actually I just ran the dollars-per-simultaneous-call numbers for
different models for some friends.  I'll append it.  Basically, if you run
g711, you're limited by the number of PRI channels on the box.  If you run
g729a, you're limited by the number of DSPs you can fit in the box.  The
numbers I ran were assuming g729a.

-Bill



   Cost
   per
Package which can handle 23 simultaneous calls:call
CISCO1760  10/100 Modular Router  $1,595
VWIC-1MFT-T1   1-Port RJ-48 Multiflex T1  $1,300
PVDM-256K-12   3-DSP Module (9 calls) $1,200
PVDM-256K-20HD 5-DSP Module (15 calls)$4,000
Total $8,095   $352

Different package which can handle 23 simultaneous calls:
CISCO2650  10/100 Modular Router  $3,295
NM-HDV-1T1-24E Single-Port T1 Voice NM$9,100
Total$12,395   $539

Package which can handle 45 simultaneous calls:
CISCO2650  10/100 Modular Router  $3,295
NM-HDV-2T1-48  Dual-Port T1 Voice NM  $9,800
Total$13,095   $291

Package which can handle 46 simultaneous calls:
CISCO2650  10/100 Modular Router  $3,295
NM-HDV-2T1-48  Dual-Port T1 Voice NM  $9,800
PVDM-256K-20HD 5-DSP Module (15 calls)$4,000
Total$17,095   $372

Upgradeable package which can handle 46 simultaneous calls:
AS535-2T1-48-AC-V  AS5350-V/2T1  $18,900   $411

Package which can handle 92 simultaneous calls:
AS535-4T1-96-AC-V  AS5350-V/4T1  $33,600   $366

Package which can handle 184 simultaneous calls:
AS535-8T1-192-AC-V AS5350-V/8T1  $58,700   $319

Upgradeable package which can handle 184 simultaneous calls:
AS54HPX-8T1-192AC  AS5400HPX/8T1 $65,500   $356

Package which can handle 644 simultaneous calls:
AS54HPX-CT3-648AC  AS5400HPX/CT3$170,300   $265







RE: VoIP QOS best practices

2003-02-10 Thread Charles Youse

That doesn't seem to make a lot of sense - is it that QoS doesn't work as advertised?

As someone who is looking to deploy VoIP in the near future this is of particular 
interest.

C.


-Original Message-
From: Bill Woodcock [mailto:[EMAIL PROTECTED]]
Sent: Monday, February 10, 2003 12:48 PM
To: [EMAIL PROTECTED]
Subject: Re: VoIP QOS best practices



  Looking for some links to case studies or other documentation which
  describe implementing VoIP between sites which do not have point to
  point links.  From what I understand, you can't enforce end-to-end QoS
  on a public network, nor over tunnels.  I'm wondering if my basic
  understanding of this is flawed and in the case that it's not, how is
  this dealt with if the ISPs of said sites don't have any QoS policies?

QoS is completely unnecessary for VoIP.  Doesn't appear to make a bit of
difference.  Any relationship between the two is just FUD from people
who've never used VoIP.

-Bill





RE: VoIP QOS best practices

2003-02-10 Thread Charles Youse

My main concern is that some of the sites that will be tied with VoIP have only T-1 
data connectivity, and I don't want a surge in traffic to degrade the voice quality, 
or cause disconnections or what-have-you.  People are more accustomed to data networks 
going down; voice networks going down will make people shout.

C.

-Original Message-
From: Bill Woodcock [mailto:[EMAIL PROTECTED]]
Sent: Monday, February 10, 2003 1:05 PM
To: Charles Youse
Cc: [EMAIL PROTECTED]
Subject: RE: VoIP QOS best practices


 That doesn't seem to make a lot of sense - is it that QoS doesn't work as 
advertised?

That's generally true as well.  But why would you need it?  What's the
advantage to be gained in using QoS to throw away packets, when the
packets don't need to be thrown away?

 As someone who is looking to deploy VoIP in the near future this is of 
particular interest.

Go ahead and deploy it.  It's easy and works well.  It certainly doesn't
need anything like QoS to make it work.

-Bill





RE: VoIP QOS best practices

2003-02-10 Thread Charles Youse

But I could conceivably have 10+ voice channels over a T-1, I still don't quite 
understand how, without prioritizing voice traffic, the quality won't degrade...

C.

-Original Message-
From: Bill Woodcock [mailto:[EMAIL PROTECTED]]
Sent: Monday, February 10, 2003 1:20 PM
To: Charles Youse
Cc: [EMAIL PROTECTED]
Subject: RE: VoIP QOS best practices


 My main concern is that some of the sites that will be tied with
 VoIP have only T-1 data connectivity, and I don't want a surge in
 traffic to degrade the voice quality, or cause disconnections or
 what-have-you.  People are more accustomed to data networks going
 down; voice networks going down will make people shout.

It works fine on 64k connections, okay on many 9600bps connections.  T1 is
way more than is necessary.

-Bill





RE: VoIP QOS best practices

2003-02-10 Thread Charles Youse

Indeed, but in this case I'm dealing with a private network that doesn't
have so much surplus as to guarantee no contention.

C.

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]
Sent: Monday, February 10, 2003 1:23 PM
To: Charles Youse
Cc: Bill Woodcock; [EMAIL PROTECTED]
Subject: Re: VoIP QOS best practices 


On Mon, 10 Feb 2003 13:02:39 EST, Charles Youse [EMAIL PROTECTED]
said:
 That doesn't seem to make a lot of sense - is it that QoS doesn't work
as advertised?

Qos is designed for dealing with who gets preference when there's a
bandwidth
shortage.  Most places are having a bandwidth glut at the moment, so
the VoIP
traffic gets through just fine and QoS isn't able to provide much
measurable
improvement.




RE: VoIP QOS best practices

2003-02-10 Thread Charles Youse

Speaking of codecs, what are the primary variables one uses when choosing a codec?  I 
imagine this is some function of how much bandwidth you want to use versus how much 
CPU to encode the voice stream.

C.

-Original Message-
From: Alec H. Peterson [mailto:[EMAIL PROTECTED]]
Sent: Monday, February 10, 2003 1:40 PM
To: Bill Woodcock; Charles Youse
Cc: [EMAIL PROTECTED]
Subject: RE: VoIP QOS best practices


--On Monday, February 10, 2003 10:19 -0800 Bill Woodcock [EMAIL PROTECTED] 
wrote:


 It works fine on 64k connections, okay on many 9600bps connections.  T1 is
 way more than is necessary.

I'd say that largely depends on which codec you are using and how many 
simultaneous calls you will have going.

Alec

--
Alec H. Peterson -- [EMAIL PROTECTED]
Chief Technology Officer
Catbird Networks, http://www.catbird.com



RE: VoIP QOS best practices

2003-02-10 Thread Charles Youse

But in order for RTP to resync the out-of-order packets it must introduce some delay, 
no?
And that delay causes issues.

C.

-Original Message-
From: Stephen Sprunk [mailto:[EMAIL PROTECTED]]
Sent: Monday, February 10, 2003 5:21 PM
To: Leo Bicknell
Cc: North American Noise and Off-topic Gripes
Subject: Re: VoIP QOS best practices



Reordering per se doesn't affect VoIP at all since RTP has an inherent
resync mechanism.

Reordering is also unlikely, since each packet is sent 20ms or more apart;
I'm not aware of any network devices that reorder on that scale.

S

- Original Message -
From: Leo Bicknell [EMAIL PROTECTED]
Sent: Monday, 10 February, 2003 12:43
Subject: Re: VoIP QOS best practices


 - --OXfL5xGRrasGEqWY
 Content-Type: text/plain; charset=us-ascii
 Content-Disposition: inline
 Content-Transfer-Encoding: quoted-printable

 In a message written on Mon, Feb 10, 2003 at 01:19:08PM -0500, chaim fried
=
 wrote:
  happens). There is no reason to implement QOS on the Core. Having said
  that, there still seems to be too many issues on the tier 1 networks
  with pacekt reordering as they affect h.261/h.263 traffic.=20

 I've got a question about this issue.  Many networks reorder packets
 for a number of reasons.  At least once before I've attempted to
 measure the effects of this reordering on a number of forms of
 traffic, but I have never understood the particular effects on VOIP
 traffic.

 Indeed, the two times I was asked to investigate this for video
 people it turns out the video receivers /had no ability to handle
 out of order frames/.  That's right, get one packet out of order
 and the video stream goes away until it resynchronizes.  Now, I
 realize reordering should not happen to a large percentage of the
 packets out there, but it also seems to me any IP application has
 to handle reordering or it's not really doing IP.

 So what's the real problem here?  Are the VOIP boxes unable to
 handle out of order packets?  Do the out of order packets simply
 arrive far enough delayed to blow the delay budget?  What percentage of
 reordered packets starts to cause issues?

 - --=20
Leo Bicknell - [EMAIL PROTECTED] - CCIE 3440
 PGP keys at http://www.ufp.org/~bicknell/
 Read TMBG List - [EMAIL PROTECTED], www.tmbg.org

 - --OXfL5xGRrasGEqWY
 Content-Type: application/pgp-signature
 Content-Disposition: inline

 - -BEGIN PGP SIGNATURE-
 Version: GnuPG v1.0.4 (FreeBSD)
 Comment: For info see http://www.gnupg.org

 iD8DBQE+R/LkNh6mMG5yMTYRAsn4AJ9Y1vO1RILDjvGdTJUPmiiknUlpHgCfedQm
 rOH5KvKO+PVnSVoLPZkG4zI=
 =LCXI
 - -END PGP SIGNATURE-

 - --OXfL5xGRrasGEqWY--

 --





RE: Weird networking issue.

2003-01-07 Thread Charles Youse
Title: RE: Weird networking issue.





By nature, a hub is half-duplex - it's a repeater.


Besides, misconfigured duplex will not cause CRC errors.


C.


-Original Message-
From: David G. Andersen [mailto:[EMAIL PROTECTED]]
Sent: Tuesday, January 07, 2003 2:08 PM
To: Drew Weaver
Cc: '[EMAIL PROTECTED]'
Subject: Re: Weird networking issue.




Rule number 1 with any ethernet: Check to make sure you have the duplex
and rate statically configured, and configured identically on both ends of
the connection.


I'd wager you've got half duplex set on one side, and full on the other...


 -Dave


On Tue, Jan 07, 2003 at 02:19:10PM -0500, Drew Weaver mooed:
 
 Hi, this is kind of a newbie question but this doesn't make a whole lot of
 sense :P
 
 I have an etherstack hub connected to a FastEthernet port on a cisco 3660
 router, these are the stats when I do a show int fast0/0:
 
 5776 input errors, 5776 CRC, 2717 frame, 0 overrun, 0 ignored
 
 Whats weird is I just cleared the counters 12 minutes ago, and already there
 are almost 6000 CRC errors. This connected via a standard Cat5 ethernet
 cable, I have tried replacing the cable to noavail.
 
 Is this a fairly normal situation, If so that's great, but it seemed rather
 ridiculous to me, and if it is not a normal situation, what would cause
 this?
 
 Any ideas are appreciated.
 Thanks,
 -Drew Weaver


-- 
work: [EMAIL PROTECTED] me: [EMAIL PROTECTED]
 MIT Laboratory for Computer Science http://www.angio.net/
 I do not accept unsolicited commercial email. Do not spam me.





RE: 18.0.0.0/8

2002-12-20 Thread Charles Youse
Title: RE: 18.0.0.0/8






Care to elaborate?


-Original Message-
From: Joe Abley [mailto:[EMAIL PROTECTED]]
Sent: Friday, December 20, 2002 1:12 PM
To: jcvaraillon
Cc: nanog list
Subject: Re: 18.0.0.0/8





On Friday, Dec 20, 2002, at 13:02 Canada/Eastern, jcvaraillon wrote:


 4Today the network 18.0.0.0/8 disappeared from the Internet, it is now 
 reachable.
  
 I went to different looking glass (MAE East, LINX, GRnet) and 
 18.0.0.0/8 was not in their routing table.
  
 Is it related to a major problem?


Yes. Not enough people understand RFC1918.



Joe





RE: CW Move

2002-10-16 Thread Charles Youse


What game is this?  I have some gear at SJC1 and I've not heard anything.

C.

-Original Message-
From: David Schwartz [mailto:[EMAIL PROTECTED]] 
Sent: Wednesday, October 16, 2002 2:02 PM
To: [EMAIL PROTECTED]; Nanog
Subject: Re: CW Move



On Wed, 16 Oct 2002 12:23:20 -0500, Moe Allen wrote:
We are in that CW group and CW is telling  us we have to sign the
contract
by Friday the 18th.  We were only  notified Last Friday.  I get concerned
when things happen this quick  without a lot of backup information.
thanks
Morris Allen
VidcomNet, Inc.

Sounds similar to the game AboveNet is playing with all their SJC1 
customers.

DS






RE: the cost of carrying routes

2002-10-14 Thread Charles Youse


I think you're confusing commercial peering agreements with 
providing customers the ability to advertise their routes via BGP.

Two different issues.

C.

-Original Message-
From: Jeff S Wheeler [mailto:[EMAIL PROTECTED]]
Sent: Monday, October 14, 2002 5:11 PM
To: [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Subject: Re: the cost of carrying routes



Ron,

Many carriers require that you advertise a certain minimum number of
routes to them over your peering sessions, or they will not peer with
you.  This suggests that those carriers see routes carried as a point of
value, rather than or in addition to one of cost.  I have seen 5,000
routes as a minimum used by more than one transit-less carrier.

Is this really an operational value perception at these carriers, or is
it simply a means of creating a barrier-to-peering?  Are fewer, shorter
prefixes seen as more valuable than longer ones, e.g. swamp /24s?  Is a
University or other entity with a legacy /16 more or less valuable as a
peer than a growing ISP with a few /20s, and presumably more eyeballs
and/or content behind them?

--
Jeff S Wheeler [EMAIL PROTECTED]

On Mon, 2002-10-14 at 16:47, Ron da Silva wrote:
*snip*
 Do any ISPs charge based on the number of announcements a customer
 advertises?
 
 If downstream advertisements became mainly smaller prefixes (say /24)
 that were not aggregatable by you as their upstream ISP, would you
 answer the above question differently?




RE: iBGP next hop and multi-access media

2002-10-06 Thread Charles Youse


Really, the only way this could happen is if Router B is not announcing its
routes to 172.16.16/24 and Router A has a default route to its Ethernet
interface.

C.

-Original Message-
From: Ralph Doncaster [mailto:[EMAIL PROTECTED]] 
Sent: Sunday, October 06, 2002 9:06 PM
To: E.B. Dreger
Cc: [EMAIL PROTECTED]
Subject: Re: iBGP next hop and multi-access media



 RD When I setup a situation like the above, with Router B advertising 
 RD the 172.16.16.0/24 to router A, router A sees a next hop of 
 RD 10.10.10.2.  This is not good since packets from A going to the 
 RD 172.16.16 subnet get sent to Router B, which then ARPs the 
 RD desitnation, instead of just being ARPed by router A.
 
 Is this what you're trying to do:
 
   route-map foo
match whatever
set ip next-hop something

Not really, what I want is router A to learn that ther is no next hop IP-
the subnet is on the local ethernet.

-Ralph



RE: redistribute bgp considered harmful

2002-10-04 Thread Charles Youse


I've never subscribed to the Are you sure? concept, or preventing problems
by removing functionality, effectively tying an operator's hands behind
his/her back.  The fact is that redistributing BGP into an IGP can have its
uses (though not usually, okay, never, when carrying a full table on the
public Internet) and I'd hate to see the messy workarounds that would come
about, when the solution could otherwise be straightforward.

My Windows workstation asks me Are you sure? all the time.  Just annoying,
really.

C.

-Original Message-
From: Sean Donelan [mailto:[EMAIL PROTECTED]]
Sent: Friday, October 04, 2002 6:01 PM
To: [EMAIL PROTECTED]
Subject: redistribute bgp considered harmful




Should the Service Provider version of routing software include the
redistribute bgp command?  Other than CCIE labs, I haven't seen a
real-world use for redistributing the BGP route table into any IGP.

If the command was removed (or included a Are your sure? question) what
would the affect be on ISPs, other than improving reliability by
stopping network engineers from fubaring a backbone?