I have what is probably a very basic question regarding the capabilities of a Cisco router for creating a Site-to-Site IPSEC tunnel between two sites. The system involved is a mainframe and one of its ethernet connections handles both server traffic and high-speed printing traffic. There is a new requirement to split the print traffic off and encrypt it, but at the same time maintain the existing, single ethernet connection from the mainframe for both servers and printers. My thought is a Cisco router could be configured to create an IPSEC tunnel for the print traffic and split it out from the server traffic. In this way, instead of the mainframe being connected straight to switched network, as it is now, it would be plugged to an ethernet interface on the router. Then an IPSEC tunnel could be created with the IOS that would send the print traffic through the network to a peer IPSEC router where the printers are located. The server traffic would be passed to the switched network as is. The router at the mainframe end would connect to the same, single inteface on switched network that it does now.
Is this a feasible setup? If so, what router family could provide this funtionality?
Question We run asr9001 with XR 6.1.3, and we have a very long delay to
login w/ SSH 1 or 2 to the device compare to IOS device. After
investigation, the there is 1s delay between the client KEXDH_INIT and
the server (XR) KEXDH_REPLY. After debug ssh serv...
Introduction The purpose of this document is to demonstrate the Open
Shortest Path First (OSPF) behavior when the V-bit (Virtual-link bit) is
present in a non-backbone area. The V-bit is signaled in Type-1 LSA only
if the router is the endpoint of one or ...
Hi, I am seeing quite a few issues with patch install and wanted to
share my experience and workaround to this. Login to admin via CLI, then
access root with the “shell” command Issue “df –h” and you’ll probably
see the following directory full or nearly ...