Barrypr wrote: » I got an email with from cisco with his recommendation: Hi Barry, So as mentioned before the header size of the IPSec information in your setup is as follows: 20 bytes IPsec header (tunnel mode) 4 bytes SPI (ESP header) 4 bytes Sequence (ESP Header) 8 byte IV (IOS ESP-DES/3DES) 6 byte pad (ESP-DES/3DES 64 bit) 1 byte Pad length (ESP Trailer) 1 byte Next Header (ESP Trailer) 12 bytes ESP SHA 96 digest So a total of 56 bytes. As agreed I will proceed with the closure of the case. If you believe there is a slowness problem I suggest you get the transfer numbers as we've discussed and open a case. We will be happy to investigate. Thanks for contacting us and Best Regards. -- Jose Customer Support Engineer - Security Team
Barrypr wrote: » Well we installed a cisco 1841 series out there, there topology was: modem--sonicwall--switch The modem was removed as well as sonicwall so now its just router--switch What they have is a company 50 or so miles away that want to connect to the server via RDP through the VPN, they want to use this for some kind of training using the sage software package, so they will be using it every day, the way it is now they cant really do this, its far too slow, even logging onto the server you type the password and wait a while before it even enters the keys you have typed. But like I said the company I work for don't really work with cisco alot, it was left to me to set this up, there are around 12 PCs that are connected to the switch and a few ip phones, so this does not seem like a lot of overhead, he said that it being slow was normal, I find this hard to believe! I dont want to go at this too much they rely on the Internet heavily, when it does do down they lose money, and they have had a lot of downtime recently due to: Me having to config this on my own( with just CCNA Knowledge) Me not have having any real word hands on cisco experience.
ilcram19-2 wrote: » what i would do if the vpn wasnt working corectly i'lldo a nat translation from the public ip address to the rdp port 3389 (i would change this to a non- standad port) on the side where the terminal server is at and see if thats moves faster if it does just leave like that thats should work properly for them instead of going from the vpn u be going from the internet
cisco_trooper wrote: » You assume the powers that be are ok with RDP being exposed....eek. Make sure you aren't accidentally funneling internet bound traffic for all 12 users through this VPN connection.
Barrypr wrote: » I would be hoping the cisco tech that spent all the time with me would have pointed out any mistakes....I had 2 cases open with them at one stage each one going through what I had done. Also I have a nat set up, our offices also connects to one of there servers on the internet via RDP, they just asked me to set this up so as they could get to this server for support which I did. ip nat inside source list 101 interface Dialer1 overload ip nat inside source static tcp 192.168.176.11 25 x.x.x.x 25 extendable ip nat inside source static tcp 192.168.176.11 110 x.x.x.x 110 extendable ip nat inside source static tcp 192.168.176.11 3338 x.x.x.x 3338 extendab le ip nat inside source static tcp 192.168.176.11 3389 x.x.x.x 3389 extendab le