Cisco Cisco Application Visibility and Management Traffic Collector Information Guide

Page of 11
monitor configuration model. 
 you can find more details about EzPM.
Limitation
Currently AVC does not support the number of pass-through tunneling protocols, details can be
found 
Internet Protocol Security (IPSec) is one of the unsupported pass-through tunneling protocols for
AVC and this document addresses the possible workaround for this limitation.
Configure
This section describes the complete configuration used to simulate the given limitation.
Network Diagram
In this network diagram all the routers have reachability to each other using the static routes. R1 is
configured with the EzPM configuration and has one IPSec tunnel established with R2 router. R3
is working as an exporter here, which could be Cisco Prime or any other kind of exporter which is
capable of collecting the performance data.
AVC traffic is generated by R1 and it is sent to the exporter via R2. R1 sends the AVC traffic to R2
over an IPSec tunnel interface.
Initial configuration
This section describes the initial configuration for R1 through R3.
R1
!
interface Loopback0
ip address 1.1.1.1 255.255.255.255
!
interface GigabitEthernet0/1
 ip address 172.16.1.1 255.255.255.0
 duplex auto
 speed auto
!
ip route 0.0.0.0 0.0.0.0 172.16.1.2