[Okta Webinar] Learn how to a build a cloud-first strategyRegister Now

x
  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 1433
  • Last Modified:

Pix to Pix VPN setup question

I am about to start working on a VPN project for my company that will require connectivity to remote sites for access to mapped drives, Exchange and web to the Corporate site.  We have a 515E at the Corp and I am planning on putting 501s at each location.  What is required as far as IP addresses to make this work?  I will get a static IP and  DSL circuit for each site to get them up and talking to the web.  As far as VPN goes, I'm new to it so bare with me.  Do I need additonal IPs, one for Corp site and one for remote site for the tunnel??    I know the PDM will probably make the VPN setup easy enough since it has a wizard to guide me through.  
0
rick_me27
Asked:
rick_me27
2 Solutions
 
pseudocyberCommented:
You only need 1 IP per site, unless you want to publish apps to the web - like a web server - and even then you could do that with PAT.  What you're talking about is called Branch Office Connections - are you going to require everyone through the tunnel or will you allow "split tunnelling" where users can go internet out normally, but back to the HQ would go through the tunnel?

I would recommend using 3DES or AES encryption.  I haven't used PIX's for VPNs, but I manage our VPN here on Nortel Contivities and we have 2 Branch Office Connections (BOC) up.

HTH
0
 
rmharwoodCommented:
Hi,

Here's some initial comments, I hope they help.

I'm assuming that you're using private addressing behind your firewall. Each of your private networks will need to have different addresses so that you can route from one to another over the VPN tunnel. Also, the firewall is told which traffic to encrypt and tunnel based upon source and destination networks.

I believe that the IP addresses of the external interfaces of the firewalls are used for the tunnels themselves.

Let me know if you need any further information.
0
 
rick_me27Author Commented:
I would like to allow everyone (5-7 users) for each remote office to have access to browse web and Corp network at the same time.  So basically all I need is one static address for the remote site and I'll configure DHCP with a private range behind the 501 and I can configure the tunnel at the Corp office to use the extrernal IP of the Pix for the source VPN address?  Then I can allow the private range from the 501 back to Corp via ACL correct?
0
New Tabletop Appliances Blow Competitors Away!

WatchGuard’s new T15, T35 and T55 tabletop UTMs provide the highest-performing security inspection in their class, allowing users at small offices, home offices and distributed enterprises to experience blazing-fast Internet speeds without sacrificing enterprise-grade security.

 
rmharwoodCommented:
Yes, that sounds about right.

If you want to access the Internet at your remote offices as well, you may need a second address to act as your PAT address. Not sure if you can use the PIX's external interface address as the PAT address?
0
 
grbladesCommented:
Yes you can use the PIX's external IP address as the PAT address using this command :-
global (outside) 1 interface

Here are a few usefull links on configuring the PIX.
PIX configuration examples - http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/prod_configuration_examples_list.html
PIX configuration basics - http://www.netcraftsmen.net/welcher/papers/pix01.html
PIX ssh configuration - http://www.tech-recipes.com/modules.php?name=Recipes&rx_id=215
My Pages:-
PIX as multi user VPN server - http://www.gbnetwork.co.uk/networking/ciscopixvpnradius.html
PIX as a home DSL firewall - http://www.gbnetwork.co.uk/networking/ciscopixhomedsl.html
0
 
rick_me27Author Commented:
thanks for the info.  I think i can handle it without any problems.  I'll set one up to my house as a test and see how it works out.
0

Featured Post

Free Tool: Port Scanner

Check which ports are open to the outside world. Helps make sure that your firewall rules are working as intended.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Tackle projects and never again get stuck behind a technical roadblock.
Join Now