I want to create a GRE tunnel from an remote IOS router to an IOS router located behind a PIX. GRE traffic originating from the remote router will be IPSec protected all the way to the PIX which will strip of the IPSec and let it continue to the GRE endpoint router behind the PIX.
In the past, when I have done this in an IOS router only environment I have used IPSec in transport mode to encrypt GRE packets between the public IPs of the routers. When I try to do something similar with the PIX I realized that the PIX will only support IPSec transport mode if I use dynamic crypto maps.
OK, no problem, but my IOS routers all have static public addresses. Will a dynamic map using an access-list of the IOS routers static public IPs work?
What about if I just use tunnel mode? Will there be a problem using tunnel mode when the access-lists specify specific hosts rather than subnets?
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...