We have a Cisco pix firewall and configured for vpn for mobile users to connect to our network securely. The mobile users cannot connect to our network for mail access from customer sites since they are behind the firewall and generally they will not entertain making a static mapping in their firewall for vpn access. Is there any way where in the site to client vpn can work from any where irrespective for firewall presence? Is smart Card option good? Is there any other option for secure connectivity no matter whether firewall is present or not?
Thanks a lot for your mail. If i do not have nat enabled on the firewall for the client system that is connecting through vpn then vpn will not work. Am i correct? I have not enabled nat-traversl. Is there any link which explains us about configuration of ssl for vpn?
nat traversal is needed if the reason your users cannot connect is because they are behind a firewall, at the client site, uses NAT.
With out without NAT, those clients could be firewalling and proxying all internet traffic. If that is the case, nat traversal will not help, and the only solution is a ssl based vpn. The 3000 series concentrators will support this soon (if not already). The pix cannot - it only supports IPSec, PPTP and L2tp vpns
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...