Configuration Guide
Configuring Per Site QoS for IPSec VPN using GRE Tunnel
Figure 1
Network Diagram

Introduction
This document describes how to configure Quality of Service (QoS) for traffic encrypted and carried over a GRE tunnel between a Hub router (Cisco 7200 Series Router) and a spoke router (Cisco 3745 Router). QoS provides the tools for managing congestions and guarantees bandwidth to a specific site.
Prerequisites
The sample QoS configuration is based on the following assumptions:
Components Used
The sample configuration uses the following releases of the software and hardware:
Figure 1 illustrates the network for the sample configuration.
The information presented in this document was created from devices in a specific lab environment. All of the devices started with a cleared (default) configuration. If you are working in a live network, it is imperative to understand the potential impact of any command before implementing it.
QoS Configuration Options
The sample configuration minimizes bandwidth guarantees and maximizes bandwidth policing. Additional QoS features that can be used in the policy map include low latency queuing, policing, and random early detection.
In the sample configuration, the class-map matches the peer destination address only. The TOS bits for the original packet are copied to the outer IPsec encapsulation. Additional matching criteria can be created, based on the TOS bits. This enables the application of different service policies to different classes for the same destination site, as well as support applications such as voice and video.
The service policy can be applied on internal or external interfaces to the hub or the spoke routers, and for the input or output traffic. The sample configuration shows the service policy applied to output traffic on the hub router.
For additional information about configuring QoS, refer to Cisco IOS Quality of Service Solutions Configuration Guide.
Cisco 7200 VPN Router Configuration
Configuring the Cisco 3745 VPN Router
Verifying the Results
This section provides information you can use to confirm that your configuration is working properly.
Bandwidth 200 (kbps) Max Threshold 64 (packets)
c3745-20#show policy-map interface fastEthernet 0/1
14184215 packets, 8154177518 bytes
30 second offered rate 11005000 bps, drop rate 0 bps
14184214 packets, 8154176952 bytes
Output Queue: Conversation 265
Bandwidth 200 (kbps) Max Threshold 64 (packets)
(pkts matched/bytes matched) 2384005/1406554530
(depth/total drops/no-buffer drops) 0/0/0
cir 5000000 bps, bc 156250 bytes
conformed 6617799 packets, 3802881934 bytes; actions:
exceeded 7566416 packets, 4351295584 bytes; actions:
conformed 5000000 bps, exceed 6004000 bps,
Class-map: class-default (match-any)
6496404 packets, 3325859178 bytes
30 second offered rate 0 bps, drop rate 0 bps
permit ip 10.0.149.0 0.0.0.255 10.0.50.0 0.0.0.255 (1103479860 matches)
permit ip host 10.0.30.245 host 10.0.30.212 (561133541 matches)
Troubleshooting the Configuration
Certain show commands are supported by the Output Interpreter Tool (registered customers only), which analyzes show command output.
Note: Before issuing debug commands, see Important Information about Debug Commands .
- debug crypto isakmpDisplays errors during Phase 1.
- debug crypto ipsecDisplays errors during Phase 2.
- debug crypto engineDisplays information from the crypto engine.
- debug ip your routing protocolDisplays information about routing transactions of your routing protocol.
- clear crypto connection connection-id [slot | rsm | vip]Terminates an encrypted session currently in progress. Encrypted sessions normally terminate when the session times out. Use the show crypto cisco connections command to see the connection-id value.
- clear crypto isakmpClears the Phase 1 security associations.
- clear crypto saClears the Phase 2 security associations.
Related Information
An Introduction to IP Security (IPsec) Encryption
Configuring IPsec Network Security
Configuring Internet Key Exchange Security Protocol
Command Lookup Tool (registered customers only)
Technical Support - Cisco Systems