I have 2 remote sites with 2801 and ADSL WICs installed.
fa 0/0 on the 2801's is connected to a 2Mb Point-to-Point circuit back to the main site. (Presented as ethernet at both ends). fa 0/1 goes the the LAN. I'm running EIGRP on this network.
The ADSL WICs provide internet access to the sites with local providers.
I'd like to setup a site-to-site VPN tunell back to my main site in the case of the 2Mb circuits failing. At the moment if the circuit fails, the users launch the VPN client software from their individual PC's, this is far from ideal!
My VPN concentrator at the main site is a Checkpoint NGX R65, but I'll be changing this to a Cisco ASA at some point this year.
My problem is that I dont think I have the correct IOS on the 2801's to let them operate as a VPN client. The IOS on them is C2801-SPSERVICESK9-M.
I think I need Advanced Security at a minimum - Cisco part number CD28N-ASK9?
Depends why you are running the SP version of the IOS. There are a number of features mostly voice and BGP that are in SP that are not in the advanced security. You would need ADVANCED IP SERVICES if you want everything in both versions.
If you plan to run EIGRP over this VPN you will need to wait until you get the ASA since I don't think checkpoint supports EIGRP... Even the ASA support of EIGRP has not been around all that long.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...