I have what I am hoping someone has successfully accomplished before. In one state I have a PIX 501 firewall, and in another I have a 2801 and behind that is a 2611. The 2611 has a 10.x.x.x network and a 192.168.x.x network on it. The 10 network connects to the 2801 via f0/1, and the 192 interface connects to a third party firewall, a sonic I believe. In order to create the IPSEC tunnel I have a 1:1 nat translation on the F0/0 interface that maps a public IP to the private IP on the 2611. In this setup IPSEC works OK, but there is a monkey wrench thrown in here that has created a real snafu. Voip runs over this interface, which for the 10,x,x,x network is not a problem, but what is a problem is there are desktop appications, and access to the CCMuser pages from the 192.168 network and also two IP communicators on the 192.168 network. In order for them to work I need NAT on the 2611, by itself works fine, but when I enable nat on the 2801, breaks the voice for the IP communicators. I need some solution to this as I have run out of ideas.
When I look at the registration for the CIPC, I am seeing the public ip address that is mapped to the 10 address. How vcan I stop the ip of the 2611 from being transalated for the CIPC, if I can solve that I think I can have this all working.
DocumentationCode download linksGoalRequirementLimitationsSupported ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in HA
DocumentationCode download linksGoalRequirementLimitationsSupported ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and UCS-E Blades:Step by Step ConfigurationCo...
I am currently unable to specify "crypto keyring" command when configuring VPN connection on my cisco 2901 router.
The following licenses have been activated on my router :