Our PACS support vendor has installed a T1 line to our org. We currently have a T1 with public IP of 188.8.131.52. What our vendor wishes to do is route all support/backup traffic to their T1 where all encryption takes place. We have a separate router set up for them. Currently, our Pix 515 rotues traffic to/from intf 0 and intf 1.
I wish to set up interfaces 2 and 3 (which are conneted to the router) for the PACS traffic. No NAT for this traffic. To make sure the PACS traffic inbound hits the PACS router, they gave us a public IP of 10.10.10.1. He will set his end up with 10.10.10.2.
Being new to the Pix, I?m pretty confused as to what commands will be necessary to accomlish this task. My main difficulty is writing the command which sends the PACS server data to the correct interface. We use private IP?s and the server IP is 192.168.125.10.
I believe the following rules are correct in setting up the interfaces:
interface ethernet2 auto
interface ethernet3 auto
nameif ethernet2 iSiteIN security 4
nameif ethernet3 isiteOut security 6
ip address isiteIN 10.10.10.1 255.255.255.252
ip address isiteOut 192.168.100.2 255.255.0.0
access-group isite_out in isiteOut
access-group isite_IN in isiteIN.
Can someone help me or point me in the right direction to complete this task?
DocumentationCode download linksGoalRequirementLimitationsSupported ISR
and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity
options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in
HA DocumentationCode download linksGoalRequirementLimitationsSupported
ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationCo...
Question I am currently unable to specify "crypto keyring" command when
configuring VPN connection on my cisco 2901 router. The following
licenses have been activated on my router :