06-04-2001 04:57 AM - edited 03-08-2019 08:19 PM
Is it recommended to have the Concentrator behind a firewall, or can it just be placed in parallel (like the documentation suggests).
If behind say a PIX, what ports do i need open for this to work.
Ta.
06-07-2001 12:26 PM
I'd suggest putting it in parallel with the PIX like the docs say. That's the way we do it!
06-07-2001 02:45 PM
The most ideal design would be the Dual DMZ implementation design. Of course you need to have two interfaces on the firewall only for the concentrator - apart from internal, external and any other DMZ you might have.
Some of the benefits of this design woule be: Unauthorized attempts will be intercepted by the firewall and traffic destined for the concentrator will be logged by the firewall and firewall can protect the concentrator from DOS attacks.
Regards / Sampath of SAMW Inc.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide