[cisco-voip] ISP and VPN Failover for Call Manager based VOIPnetwork

Craig M Staffin CMStaffin at ra.rockwell.com
Thu Sep 14 09:14:34 EDT 2006


Manoj,

Your best solution is to do IPSEC tunnell within a GRE tunnell.  This will 
allow you to do EIGRP as well as CDP works now through GRE.  This can and 
does work across as many vendors as you want.  We are currently useing 
this exact setup across atleast 10 different vendors.  The only thing to 
be careful of is be very picky about your vendors and make sure that the 
peering between your two vendors is very good and reliable.

Craig





"Manoj Kalpage" <manoj.kalpage at gmail.com> 
Sent by: cisco-voip-bounces at puck.nether.net
09/14/2006 04:44 AM

To
"Linsemier, Matthew" <MLinsemier at apcapital.com>
cc
cisco-voip at puck.nether.net
Subject
Re: [cisco-voip] ISP and VPN Failover for Call Manager based VOIPnetwork






Hi Matthew,
What a wonderful reply. Thank you very much for your reply. I was thinking 
in wrong way. We have just 1Mbps full duplex Internet connection from 
Verizon and we are experiencing lot of voice quality issues recently. I 
know now I should move to router based VPN. Can I do EIGRP between 
different provide without having service agreement? What I heard I have to 
pay extra money for EIGRP. After read your reply I did some research on 
the web and found bellow link from Cisco. Do you think this is enough 
information for me to implement VoIP environment you have suggested? 
http://www.cisco.com/warp/public/471/dcmvpn.html
By any chance, do you have a sample configuration of your network which I 
can refer?
 
Best Regards,
Manoj
 

 
On 9/13/06, Linsemier, Matthew <MLinsemier at apcapital.com> wrote: 
Manoj,
 
Do you currently have private lines or some other circuits interconnecting 
your offices or are you planning to use VPN exclusively for voice and 
data?  My major concern when using a Cisco PIX for voice would be Quality 
of Service.  While the PIX can preserve DSCP values as they are passed 
across the tunnels, unless anything has changed in 7.x, it doesn't have 
the ability to perform marking, LLQ prioritization, and traffic shaping. 
This means that before any traffic is passed to the PIX, the device behind 
it (a switch or router) will have to perform some of these functions (say 
marking or traffic shaping).  In regards to LLQ you are out of luck. 
 
For our Teleworker VPN network we utilize a 2851 at the head-end and 
failover site and 871/877 routers at our remotes.  This gives us the 
capability to mark, LLQ, and shape traffic at the edge, before it is 
passed on to the ISP.  Additionally we utilize DMVPN and GRE to maintain 
routing information (EIGRP) and to dynamically handle routing changes when 
we loose a VPN link (say to our head-end).  I think you can do some least 
cost routing type things on the PIX to achieve the same effect, but it's 
much easier in IOS. 
 
Your ideas are sound in my opinion.  I'm sure that there are some people 
that are handling voice fine using Cisco PIX's however we had mixed 
results when we were using them.  Once we moved to the IOS VPN several of 
our QoS issues were resolved.  Regardless, you always have to remember 
that it still is the Internet and not a private network connection, so you 
get what you get. 
 
Hope this helps,
 
-Matt
 

From: cisco-voip-bounces at puck.nether.net [mailto:
cisco-voip-bounces at puck.nether.net] On Behalf Of Manoj Kalpage
Sent: Wednesday, September 13, 2006 5:20 AM
To: cisco-voip at puck.nether.net
Subject: [cisco-voip] ISP and VPN Failover for Call Manager based 
VOIPnetwork
 
Dear All,
I am looking for ISP fail over for VoIP network. We have small enterprise 
VoIP network. If I explain our network bit, Basically we have call manager 
and unity server in main office with PIX515. All the branch offices has 
PIX 501. With attached fail over solution I am going to create two tunnels 
from each branch office and have them connected to each firewall in main 
office. I think this way if one PIX515 fail at main office, still branch 
office can be connected through second PIX515. Bellow is the router 
configuration for routing between two PIX 515. This configuration itself 
doesn't mean anything without looking at a diagram.I need to test this but 
I don't have enough gears with me right now and also I don't have 100% 
confidence on this. So, I would like to share with you folks. Any comments 
and ideas would be greatly appreciated. 
 
Please find the diagram bellow link (Sorry it's han written one )
http://proxy.f2.ymdb.yahoofs.jp/bc/857e55a/bc/bd7f/failover.jpg?bcQM9BFBNirrJIWq
 
best regards,
Manoj
 

ip cef
!####Establish sla monitors for use in tracking objects####!
ip sla monitor 1
type echo protocol ipIcmpEcho 174.16.0.1
threshold 3
frequency 5
ip sla monitor schedule 1 life forever start-time now 
ip sla monitor 2
type echo protocol ipIcmpEcho 173.16.0.1
threshold 3
frequency 5
ip sla monitor schedule 2 life forever start-time now 
!
!####Configure Tracking objects (referencing IP SLA monitor's above)####!
track 101 rtr 1 reachability
!
track 102 rtr 2 reachability
!
!
!
!
!####Configure Interfaces with NAT####!
interface FastEthernet 0/1
ip address 172.16.0.1 255.255.0.0
ip nat inside
!
interface Fastethernet 0/0
ip address 173.16.0.2 255.255.255.0
ip nat outside
!
interface Fastethernet 0/2
ip address 174.16.0.2 255.255.255.0
ip nat outside
!
ip classless
!####Configure gateway of last resort with tracking objects####!
ip route 0.0.0.0 0.0.0.0 173.16.0.1 track 101 
ip route 0.0.0.0 0.0.0.0 174.16.0.1 track 102
!####Configure NAT statements for most outbound traffic####!
ip nat inside source route-map ISP1 interface FastEthernet 0/0 overload
ip nat inside source route-map ISP2 interface FastEthernet 0/2 overload 
!
access-list 10 permit 172.16.0.0 0.0.0.255
access-list 101 permit icmp any host 173.16.0.1 echo
access-list 102 permit icmp any host 174.16.0.1 echo
!
!####Configure route maps for reference in NAT statements####!
route-map ISP2 permit 10
match ip address 10
match interface Fastethernet 0/1 
!
route-map ISP1 permit 10
match ip address 10
match interface Fastethernet 0/0 
! 
 


CONFIDENTIALITY STATEMENT
This communication and any attachments are CONFIDENTIAL and may be 
protected by one or more legal privileges. It is intended solely for the 
use of the addressee identified above. If you are not the intended 
recipient, any use, disclosure, copying or distribution of this 
communication is UNAUTHORIZED. Neither this information block, the typed 
name of the sender, nor anything else in this message is intended to 
constitute an electronic signature unless a specific statement to the 
contrary is included in this message. If you have received this 
communication in error, please immediately contact me and delete this 
communication from your computer. Thank you. 

_______________________________________________
cisco-voip mailing list
cisco-voip at puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-voip

-------------- next part --------------
An HTML attachment was scrubbed...
URL: https://puck.nether.net/pipermail/cisco-voip/attachments/20060914/9211d9c5/attachment.html 


More information about the cisco-voip mailing list