?
Solved

Setting up Cisco VPN 3005

Posted on 2004-09-30
3
Medium Priority
?
487 Views
Last Modified: 2013-11-16
Hi all,

I just purchased a Cisco VPN Concentrator 3005 and am having trouble getting it to work. Here's my current config. We have an Internet T1 that goes into an Intel router. From there it goes to a Sonicwall Firewall. After that, it goes to our switch and then out to our internal network. My question is where is the best place to put the VPN Concentrator? I figured the private port would plug into the switch and I gave it an IP of 192.168.0.7 and the public needs to have an Internet IP, but where does that plug into? The switch also? Or do I need to have another switch that has the Intel router plugged into it and it  bypasses the firewall? Any help would be appreciated.

Thanks,
Matt
0
Comment
Question by:mbarys
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 2

Expert Comment

by:peteysa
ID: 12197030
Good Evening,

Typically the VPN concentrator is plugged in externally one interface, internally second interface.  The VPN concentrator does not route/forward packets unless they are fully authenticated which is more secure than a standard firewall.  

Some Concentrators do support one armed configurations which would utilize only one interface, I am not sure if the Cisco supports that setup.  I know the sonicwall vpn concentrator has that option.

Cheers,

Dan
0
 

Author Comment

by:mbarys
ID: 12199552
That's what I figured. So I'm trying to understand how I would plug in the concentrator into the external interface. Would I hang a switch off of the router and then plug in the concentrator into that?

Thanks,
Matt
0
 
LVL 5

Accepted Solution

by:
netspec01 earned 2000 total points
ID: 12201675
Actually a VPN can be setup behind a firewall, in front of a firewall or parallel to a firewall.  Parallel would be the most common since it is the most simple to do.

trusted network----firewall-------switch----router----ISP
           |                                      |
            ---------concentrator--------

You will need a static pblic IP address assigned to the concentrator.

The second most popular configuratio would be to have the concentrator in front of a firewall or screening router.  This allows you the distinct advantage of adding another layer of access control/filtering.
0

Featured Post

Cyber Threats to Small Businesses (Part 2)

The evolving cybersecurity landscape presents SMBs with a host of new threats to their clients, their data, and their bottom line. In part 2 of this blog series, learn three quick processes Webroot’s CISO, Gary Hayslip, recommends to help small businesses beat modern threats.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article is a collection of issues that people face from time to time and possible solutions to those issues. I hope you enjoy reading it.
This article explains the fundamentals of industrial networking which ultimately is the backbone network which is providing communications for process devices like robots and other not so interesting stuff.
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…
In this brief tutorial Pawel from AdRem Software explains how you can quickly find out which services are running on your network, or what are the IP addresses of servers responsible for each service. Software used is freeware NetCrunch Tools (https…
Suggested Courses
Course of the Month15 days, 17 hours left to enroll

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question