?
Solved

IPSEC VPN Bandwidth question with different ISP speeds on both locations

Posted on 2014-09-03
2
Medium Priority
?
325 Views
Last Modified: 2014-09-08
There is a site to site IPsec vpn. Site A is 18down/3up Cable broadband, Site B is 18down/18up dedicated line. Not taking in consideration overhead or inconsistency of the broadband ISP.
It is my understanding that the VPN tunnel bandwidth would be 3up/3down. However, my colleagues which are much more experienced than I am, informed me that it would be 18down and 3 up. Can someone please clarify this for me and provide me a location where I can read about this.
0
Comment
Question by:ctechsol
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 26

Accepted Solution

by:
Fred Marshall earned 2000 total points
ID: 40302756
Site A              3 up               18 down          
Site B            18 down         18 up
Combined      3                     18

A to B 3Mbps
B to A 18Mbps

VPN at Site A: 18 down because A is 18 down and B is 18 up at the other end.
VPN at Site A: 3 up because A is 3 up
VPN at Site B: 3 down because it's limited by Site A uplink speed at the other end.
VPN at Site B: 18 up because both Site B and Site A (down) will support that.

So the tunnel speed will be 18 Mbps moving data from B to A and 3 Mbps moving data from A to B.

Data rate is limited by the slowest link in the chain.
0
 

Author Comment

by:ctechsol
ID: 40310147
Thank you so much, I was wondering, if possible is there any known education resources about this in particular to understand how the protocol (IPSEC) sets up windowing.
0

Featured Post

Secure Your WordPress Site: 5 Essential Approaches

WordPress is the web's most popular CMS, but its dominance also makes it a target for attackers. Our eBook will show you how to:

Prevent costly exploits of core and plugin vulnerabilities
Repel automated attacks
Lock down your dashboard, secure your code, and protect your users

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

WARNING:   If you follow the instructions here, you will wipe out your VTP and VLAN configurations.  Make sure you have backed up your switch!!! I recently had some issues with a few low-end Cisco routers (RV325) and I opened a case with Cisco TA…
During and after that shift to cloud, one area that still poses a struggle for many organizations is what to do with their department file shares.
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…
Michael from AdRem Software outlines event notifications and Automatic Corrective Actions in network monitoring. Automatic Corrective Actions are scripts, which can automatically run upon discovery of a certain undesirable condition in your network.…
Suggested Courses
Course of the Month13 days, 8 hours left to enroll

800 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question