Archive for April, 2013

Life of a Packet—IOS Basic Order of Operations

April 2, 2013

Some notes:

Inside-to-Outside (LAN to WAN)

Outside-to-Inside (WAN to LAN)
If IPsec, then check input access listDecryption (if applicable) for IPsec

Check input access list

Check input rate limits

Input accounting

Policy routing

Routing

Redirect to web cache (WCCP or L2 redirect)

WAAS application optimization (start/end of WAAS optimization path)

NAT inside to outside (local to global translation)

Crypto (check map and mark for encryption)

Check output access list

Inspect (Context-based Access Control (CBAC))

TCP intercept

Encryption

Queueing

MPLS VRF tunneling (if MPLS WAN deployed)

MPLS tunneling (if MPLS WAN deployed)Decryption (if applicable) for IPsec

Check input access list

Check input rate limits

Input accounting

NAT outside to inside (global to local translation)

Policy routing

Routing

Redirect to web cache (WCCP or L2 redirect)

WAAS application optimization (start/end of WAAS optimization path)

Crypto (check map and mark for encryption)

Check output access list

Inspect (Context-based Access Control (CBAC))

TCP intercept

Encryption

Queueing

1 Source: http://www.cisco.com/en/US/tech/tk648/tk361/technologies_tech_note09186a0080133ddd.shtml

Real source: http://www.cisco.com/en/US/docs/solutions/Enterprise/Data_Center/WAASDC11.html

 

Advertisements