Solved

PIX 506e VPN Tunnel based on OSPF Routes

Posted on 2004-08-23
2
357 Views
Last Modified: 2013-11-16
I have a PIX 506e in a remote office that has OSPF capabilities. The endpoint is a VPN 3000 concentrator on my corporate network that is transfering the OSPF routes to the PIX.

Is it possible to build a VPN tunnel on the PIX based on the learned OSPF routes? Or do I have to tunnel everything, including internet traffic, back to the concentrator and let the concentrator make the routing decisions? If I have to tunnel everything back, I will not bother setting up OSPF on the PIX.

What do you think?
0
Comment
Question by:mousers
2 Comments
 
LVL 36

Accepted Solution

by:
grblades earned 200 total points
ID: 11869942
Hi mousers,
Personally I would not use OSPF on the PIX unless your network is so large that defining static routes would be a problem.

Have a look at this configuration example as it deals with passing ospf routing across a VPN.
http://www.cisco.com/en/US/tech/tk583/tk372/technologies_configuration_example09186a00800a43f6.shtml
0
 

Author Comment

by:mousers
ID: 11869985
I'll take a look.

Yes, my Corporate LAN is hooked into a larger Corporate Intranet (the people who own us) and there are too many routes to define statically.
I have been adding static routes up to now but it is getting unmanagable.
0

Featured Post

Microsoft Certification Exam 74-409

Veeam® is happy to provide the Microsoft community with a study guide prepared by MVP and MCT, Orin Thomas. This guide will take you through each of the exam objectives, helping you to prepare for and pass the examination.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Most of the applications these days are on Cloud. Cloud is ubiquitous with many service providers in the market. Since it has many benefits such as cost reduction, software updates, remote access, disaster recovery and much more.
Many of the companies I’ve worked with have embraced cloud solutions due to their desire to “get out of the datacenter business.” The ability to achieve better security and availability, and the speed with which they are able to deploy, is far grea…
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

730 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question