Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations biv343 on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

VPN Slow and unable to print using JetDirect 1

Status
Not open for further replies.

pellepiet

Technical User
Jun 19, 2003
6
NL
I have 2 locations with Cisco 826 + IP feature pack. Because this is my first VPN using cisco's, I tried to set up a VPN using parts of the many examples.
The VPN is up and running but the performance is bad and first I could print from a Windows 2000 server on one site to a printer (connected to a HP JetDirect) on the other site.


Config location with Windows 2000 server

Current configuration : 4341 bytes
!
version 12.2
no service pad
service timestamps debug uptime
service timestamps log uptime
service password-encryption
!
hostname admin
!
logging buffered 4096 informational
enable secret 5 xxxxxx
!
username Johnt privilege 15 password 7 xxxxxxxxx
username admin password 7 xxxxxxxxx
ip subnet-zero
no ip source-route
ip host Kampen 99.99.99.99
ip name-server 194.134.5.5
ip name-server 194.134.0.97
ip dhcp excluded-address 192.168.0.38
!
ip inspect name myfw cuseeme timeout 3600
ip inspect name myfw ftp timeout 3600
ip inspect name myfw rcmd timeout 3600
ip inspect name myfw realaudio timeout 3600
ip inspect name myfw smtp timeout 3600
ip inspect name myfw tftp timeout 30
ip inspect name myfw udp timeout 15
ip inspect name myfw tcp timeout 3600
ip inspect name myfw h323 timeout 3600
ip inspect name firewall ftp
ip inspect name firewall tcp timeout 3600
ip inspect name firewall udp timeout 60
ip ssh time-out 120
ip ssh authentication-retries 3
!
crypto isakmp policy 4
authentication pre-share
crypto isakmp key xxxxxxxxxx123 address 99.99.99.99
!
!
crypto ipsec transform-set encrypt-des esp-des
!
crypto map combined local-address Dialer1
crypto map combined 20 ipsec-isakmp
set peer 99.99.99.99
set transform-set encrypt-des
match address 105
!
!
!
!
interface Ethernet0
description CRWS Generated text. Please do not delete this:192.168.0.254-255.255.255.0
ip address 192.168.0.254 255.255.255.0 secondary
ip address 10.10.10.1 255.255.255.0
ip nat inside
hold-queue 100 out
!
interface ATM0
no ip address
atm vc-per-vp 64
no atm ilmi-keepalive
pvc 8/48
encapsulation aal5mux ppp dialer
dialer pool-member 1
!
dsl operating-mode auto
!
interface Dialer0
no ip address
no cdp enable
!
interface Dialer1
ip address negotiated
ip access-group 111 in
ip nat outside
ip inspect myfw out
encapsulation ppp
no ip route-cache
no ip mroute-cache
dialer pool 1
dialer-group 1
ppp authentication chap pap callin
ppp chap hostname yyyyyyy@euronet.nl-512
ppp chap password 7 yyyyyyyyyy
ppp pap sent-username yyyyyyyy@euronet.nl-512 password 7 yyyyyyyyyyyyyyy
crypto map combined
hold-queue 224 in
!
ip nat inside source list 102 interface Dialer1 overload
ip nat inside source static tcp 192.168.0.38 3389 interface Dialer1 3389
ip nat inside source route-map nonat interface Dialer1 overload
ip nat inside source static tcp 192.168.0.38 1723 interface Dialer1 1723
ip classless
ip route 0.0.0.0 0.0.0.0 Dialer1
ip http server
ip pim bidir-enable
!
!
access-list 23 permit 192.168.0.0 0.0.0.255
access-list 23 permit 10.10.10.0 0.0.0.255
access-list 105 permit ip 192.168.0.0 0.0.0.255 192.168.39.0 0.0.0.255
access-list 111 permit tcp any any eq 3389
access-list 111 permit icmp any any administratively-prohibited
access-list 111 permit icmp any any echo
access-list 111 permit icmp any any echo-reply
access-list 111 permit icmp any any packet-too-big
access-list 111 permit icmp any any time-exceeded
access-list 111 permit icmp any any traceroute
access-list 111 permit icmp any any unreachable
access-list 111 permit udp any eq bootps any eq bootpc
access-list 111 permit udp any eq bootps any eq bootps
access-list 111 permit udp any eq domain any
access-list 111 permit esp any any
access-list 111 permit udp any any eq isakmp
access-list 111 permit udp any any eq 10000
access-list 111 permit tcp any any eq 1723
access-list 111 permit tcp any any eq 139
access-list 111 permit udp any any eq netbios-ns
access-list 111 permit udp any any eq netbios-dgm
access-list 111 permit gre any any
access-list 111 permit ip 192.168.39.0 0.0.0.255 192.168.0.0 0.0.0.255
access-list 150 deny ip 192.168.0.0 0.0.0.255 192.168.39.0 0.0.0.255
access-list 150 permit ip 192.168.0.0 0.0.0.255 any
access-list 200 permit 0x1323 0x0000
dialer-list 1 protocol ip permit
route-map nonat permit 10
match ip address 150
!
!
line con 0
exec-timeout 120 0
stopbits 1
line vty 0 4
access-class 23 in
exec-timeout 120 0
login local
length 0
!
scheduler max-task-time 5000
end

Config location with workstation and printer

Current configuration : 4152 bytes
!
version 12.2
no service pad
service timestamps debug uptime
service timestamps log uptime
service password-encryption
!
hostname NSK
!
no logging buffered
enable secret 5 xxxxxxxx
!
username NSK password 7 xxxxxxxxxxx
ip subnet-zero
no ip source-route
ip host Assen 88.88.88.88
ip name-server 192.168.0.38
ip dhcp excluded-address 192.168.39.1
ip dhcp excluded-address 192.168.39.1 192.168.39.128
ip dhcp excluded-address 192.168.39.128
!
ip dhcp pool CLIENT
import all
network 192.168.39.0 255.255.255.0
default-router 192.168.39.1
dns-server 192.168.0.38
domain-name domeinnaam.com
lease 0 2
!
ip inspect name myfw cuseeme timeout 3600
ip inspect name myfw ftp timeout 3600
ip inspect name myfw rcmd timeout 3600
ip inspect name myfw realaudio timeout 3600
ip inspect name myfw smtp timeout 3600
ip inspect name myfw tftp timeout 30
ip inspect name myfw udp timeout 15
ip inspect name myfw tcp timeout 3600
ip inspect name myfw h323 timeout 3600
ip inspect name firewall ftp
ip inspect name firewall tcp timeout 3600
ip inspect name firewall udp timeout 60
ip ssh time-out 120
ip ssh authentication-retries 3
!
crypto isakmp policy 4
authentication pre-share
crypto isakmp key xxxxxxxxxx123 address 88.88.88.88
!
!
crypto ipsec transform-set encrypt-des esp-des
crypto ipsec df-bit clear
!
crypto map combined local-address Dialer1
crypto map combined 7 ipsec-isakmp
set peer 88.88.88.88
set transform-set encrypt-des
match address 105
!
!
!
!
interface Ethernet0
description CRWS Generated text. Please do not delete this:192.168.39.1-255.255.255.0
ip address 192.168.39.1 255.255.255.0 secondary
ip address 10.10.10.1 255.255.255.0
ip nat inside
no cdp enable
hold-queue 100 out
!
interface ATM0
no ip address
atm vc-per-vp 64
no atm ilmi-keepalive
pvc 8/48
encapsulation aal5mux ppp dialer
dialer pool-member 1
!
dsl operating-mode auto
!
interface Dialer0
no ip address
no cdp enable
!
interface Dialer1
ip address negotiated
ip access-group 111 in
ip nat outside
ip inspect myfw out
encapsulation ppp
no ip route-cache
no ip mroute-cache
dialer pool 1
dialer-group 1
no cdp enable
ppp authentication chap pap callin
ppp chap hostname xxxxxxxx@euronet.nl-basic
ppp chap password 7 xxxxxxxxxx
ppp pap sent-username xxxxxxx@euronet.nl-basic password 7 xxxxxxxx
ppp ipcp dns request
ppp ipcp wins request
crypto map combined
hold-queue 224 in
!
ip nat inside source list 102 interface Dialer1 overload
ip nat inside source route-map nonat interface Dialer1 overload
ip classless
ip route 0.0.0.0 0.0.0.0 Dialer1
ip http server
ip pim bidir-enable
!
!
access-list 23 permit 192.168.39.0 0.0.0.255
access-list 23 permit 10.10.10.0 0.0.0.255
access-list 105 permit ip 192.168.39.0 0.0.0.255 192.168.0.0 0.0.0.255
access-list 111 permit icmp any any administratively-prohibited
access-list 111 permit icmp any any echo
access-list 111 permit icmp any any echo-reply
access-list 111 permit icmp any any packet-too-big
access-list 111 permit icmp any any time-exceeded
access-list 111 permit icmp any any traceroute
access-list 111 permit icmp any any unreachable
access-list 111 permit udp any eq bootps any eq bootpc
access-list 111 permit udp any eq bootps any eq bootps
access-list 111 permit udp any eq domain any
access-list 111 permit esp any any
access-list 111 permit udp any any eq isakmp
access-list 111 permit udp any any eq 10000
access-list 111 permit tcp any any eq 1723
access-list 111 permit tcp any any eq 139
access-list 111 permit udp any any eq netbios-ns
access-list 111 permit udp any any eq netbios-dgm
access-list 111 permit gre any any
access-list 150 deny ip 192.168.39.0 0.0.0.255 192.168.0.0 0.0.0.255
access-list 150 permit ip any any
dialer-list 1 protocol ip permit
no cdp run
route-map nonat permit 10
match ip address 150
!
!
line con 0
exec-timeout 120 0
stopbits 1
line vty 0 4
access-class 23 in
exec-timeout 120 0
login local
length 0
!
scheduler max-task-time 5000
end
 
i said that mainly because of these statements

access-list 111 permit tcp any any eq 139
access-list 111 permit udp any any eq netbios-ns
access-list 111 permit udp any any eq netbios-dgm

this will open your network up to a whole slew of security vunerabilities
remember acls are evaluated before the firewall rules, so if you allow something in in the acl, it will overide your firewall. you are also letting any client pc on the Internet make DHCP request into you network. if you run a syslog server you will see the amount of people that will tamper with you network. believe me, no offense intended, but you will screw yourself leaving those three netbios ports open.
 
Thanks for your comments. I was looking for a solution to get a better performance for the VPN and did not take to much care for the security. I think I copied it in there during my struggle for speed.

The DHCP thing is not completely clear for me. How do I bind the DHCP only to the internal LAN?

And do you have any suggestion to get more speed on the VPN. I think it has something to do with the MTU size or with SMB through the VPN.

Using the explorer on one side of the VPN to browse on the server at the other side, the speed seems to be normal. But when opening or browse for document from within Word or Excel (Office XP)it takes minutes.


 
as far as accelarating the vpn

what type of hw do you have at the central site?
how many users are at these branch sites?

there are hardware vpn accelaration modules for different cisco hardware (i.e. VAC for 17xx, 3015 concentrator, etc)

the number of acl entries on your side will also play a part in processing incoming packets

you are also limited by the motherboard and the amount of memory in all the routers in the chain.

you should go on cisco's site check into the hardware specs and pkts per second and ipsec pkts per second (the administrative cost of the des/3des encryption/decryption process on your router mem and cpu). this is usually one of the determining factors when i am purchasing a router for an organization. this vs. # of users.


i have 806's set up at remote office vpn sites that have less than 10 users. they are primarily running database applications and terminal emulation on servers located at our main site.

anything from 25-150 users, personally, i'd go with a 1700
anything over that i'd look at the 2600 models
 
I have only 2 standard Cisco 826 ADSL router. No extra memory. Maybe it's in the ipsec pkts per second. I wil look at the spec's at cisco's site.

number of users on remote site is 3.

Any tip regarding DHCP?
 
Status
Not open for further replies.

Part and Inventory Search

Sponsor

Back
Top