G
Guest
Guest
Archived from groups: comp.dcom.vpn (More info?)
Hi,
I am not a Cisco PIX guru, I just need to know if something is
possible ;-)
On a central site, I'd have a PIX 515 with VPN. On remote sites, a lot
of PIX 506 with VPN capabilities too.
Is it possible to do so.
On the central site, we'd use real IP addressing for the servers. Ie,
195.238.10.0/26 with .1 for the firewall, ,2, .3, .4 for the servers.
On the renote site, we have most of the time a Private Network
according to the RFC hide-nated to the IP of the external interface of
the firewall.
So, now, the RFC hide-nated networks get the external Ip of the PIX
506 firewall if the need to get into 195.238.10.0/26. It works ok.
Now, for security reasons, we'd need to have the nated data flow to be
VPN encrypted and auth.
What to add into the PIX 506 and PIX 515 to achieve so?
Thank you,
Allan
Hi,
I am not a Cisco PIX guru, I just need to know if something is
possible ;-)
On a central site, I'd have a PIX 515 with VPN. On remote sites, a lot
of PIX 506 with VPN capabilities too.
Is it possible to do so.
On the central site, we'd use real IP addressing for the servers. Ie,
195.238.10.0/26 with .1 for the firewall, ,2, .3, .4 for the servers.
On the renote site, we have most of the time a Private Network
according to the RFC hide-nated to the IP of the external interface of
the firewall.
So, now, the RFC hide-nated networks get the external Ip of the PIX
506 firewall if the need to get into 195.238.10.0/26. It works ok.
Now, for security reasons, we'd need to have the nated data flow to be
VPN encrypted and auth.
What to add into the PIX 506 and PIX 515 to achieve so?
Thank you,
Allan