I have a situation where I will have a 2600 with the Firewall Feature Set behind a PIX (don't ask why, please, plus the PIX does not have IPSec licensing). How do I configure the outside interface ACLs to pass IKE, SA, and IPSec traffic to the inner 2600 and sucessfully setup a VPN between an outside client and the 2600? I plan to use static NATing of a public address to a private inside.
If you really not want to use the pix for terminating the VPN you have open protcol 51 on your pix (simply put 51 in place where normally you say ip) and you have to open UDP port 500. That should be it, I think. But I do not recommend this setup.
Thanks for both of the replies. I did not know that the DES and 3DES licenses were free of charge. I'll look at that first. I don't expect too much VPN traffic (maybe 2 simultaneous tunnels max) so there shouldn't be too much of a cpu load on the PIX (515E). The 2600 does have the encryption accelerator card on it, and the PIX does not. Is the AIM card interchangeable between the 2600 and the PIX?
Table of ContentsIntroductionVersion HistoryPossible Future
UpdatesDocuments PurposeNAT Operation in ASA 8.3+ SectionsRule Types
Network Object NATTwice NAT / Manual NATRule Types used per SectionNAT
Types used with Twice NAT / Manual NAT and Network Obje...
Table of Contents Introduction:This document describes details on how
NAT-T works. Background: ESP encrypts all critical information,
encapsulating the entire inner TCP/UDP datagram within an ESP header.
ESP is an IP protocol in the same sense that TCP an...