I try to establish connection to the remote network by terminating GRE tunnel in my internal router, Cisco 6000 and terminate IPSec in my pix firewall (Fig. 2). How can I direct my workstation to go through GRE Tunnel and redirect the traffic to my pix to enclose GRE traffic in IPSEC tunnel? But I want also to keep the way they connect to the Internet as normally. The requirements are that I should do NAT in my (Cisco 6006) before I redirect the traffic to the pix firewall. In my normal scenario all data traffic are send to pix firewall than pix dose Nat before send the traffic to the Internet (Fig. 1), but in this case I have to do Nat in my Cisco 6000 before send them trough GRE tunnel than to my pix firewall. Please refer to the attached file for network diagram. And I apologize for my poor English and I appreciate for any help.
The configuration at the 6006 device will remain the same as far as routing. The PIX remains the default route.
At the PIX, you need to add a route for the remote network with next hop being the remote link of the GRE. You need to do the same at the other end. Your 'route inside' at the PIX will point to the NAT address in the 6006 device and you will have two 'route outside'. One 'route outside' will be for the remote network and the second one will be the default route (route outside 0.0.0.0 0.0.0.0 x.x.x.x)
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...