03-22-2002 01:16 AM - edited 02-21-2020 11:39 AM
Any problems with static nat of vpn ipsec central peer?
I'd like to protect a VPN concentrator or an IOS router with a pix. Concentrator with private address statically natted by the pix.
I know I need esp.
Thanks in advance
Renato
03-26-2002 06:42 AM
this works poorly with vpn concentrator, worse with
ios router. IF you go this route, your remote peer MUST be using a public IP (NO NAT). You cannot
have both local and remote devices using private
IP's. (I have tried for a long time). If you do this,
do a one to one nat (public > Private) lock it
down with access list, but you cant effectively do
ESP PAT with PIX
03-26-2002 09:49 AM
Yes, remote peers with public ip address and central vpn concentrator with static nat.
Thanks
03-26-2002 07:17 AM
setup three areas on PIX: public; dmz; inside. Plug the vpn (I assume this is a Cisco VPN 3000..) concentrator's public interface to the dms switch (both PIX's dmz interface and vpn concentrator's public interface on the same switch), then plug the PIX inside to the inside switch, plug in the vpn inside interface to the inside switch, plug the router's eithernet interface to the inside switch. Your local lan will be on the the same segment as the inside swith. config is simple, works very well. does this help?
03-26-2002 09:53 AM
yes sure, that's my idea. Any problems with static nat of public vpn3000 interface ? (or ios router for peer-to-peer)
03-26-2002 05:00 PM
I do not see an issue with it. This is one of the option provided by VPN 3000. but if you select this option "IPSec through NAT", you must also enable it at the client.
03-27-2002 09:10 AM
Do you see issues with ios routers in the place of central vpn concentrator?
Thanks
03-27-2002 03:58 PM
It depends on how many sessions you plan to terminate on the router. IOS router even with VPN accelerator card will still have lot of limitations when it comes to support large number of VPN clients. I will not replace VPN concentrator with an IOS router unless you are talking about 7100 or above routers thats design to handle VPN. Remember, IOS needs to create access-list dynamically to handle the security requests. That puts pressure on processor.
Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: