I was recently asked to looking to what I would call a complex network structuring for a remote office that uses a 881w. I only know enough about the configurations for the 881 to be dangerous. So I was hoping someone might be able to help provide a sample. I have to 2 of these each with just about the same configuration, minus one little detail that I'll explain below.X
Below you will have a img for the structure I'm wanting to accomplish.
Currently the devices are configured like it's show above minus 1 thing. The isolated lan. Basicly what I'm looking to accomplish is have the isolated lan act kinda like a dual wan. I want the 172.16.9.0/24 to be able to reach anything on the 10.10.6.0/24 subnet, but only allow established connections from the 10.10.6.0/24 subnet to come back into the 172.16.9.0/24 subnet.
I did mention that I have to do this with 2 devices, but there is a minior defference between them. 1 of them also needs to establish a outbound IPSEC Xauth under Network Address Extension mode to a VPN Concentrator. I've never programmed a VPN connection on the 881 before. I've only ever done it on a PIX 501. So I'm not sure how to do it. I have read this article, but looking at it seems to have the person trying to connect to othre side of the vpn authenticate themselfs, which isn't what I want. What i've done for the PIX configurations in the past is something like:
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...