Vpn from private IP

Posted on 2006-03-28
Last Modified: 2013-11-16
my configuration is:
Office: pix 506E, 6.3(5) Outside ip: static - public

ADSL Router Outside ip: Dynamic - public
PIX 501 6.3(5) Outside:, Gateway:
Inside: , clients: 10.12.7.X

When i am at home, from My laptop, with Cisco clients v 4.8 i am able to connect by vpn to office.
I am trying to configure the hpme PIX to connect office PIX by vpn, so all my home pc are tunnelled.
I configure all but the log say:

ISAKMP Phase 1 retransmission (local (initiator), remote xxremoteIPxx)

702303: sa_request, (key eng. msg.) src=, dest= xxremoteIPxx, src_proxy= (type=4),
dest_proxy= (type=4), protocol= ESP, transform= esp-des esp-md5-hmac ,
lifedur= 28800s and 4608000kb, spi= 0x0(0), conn_id= 0, keysize= 0, flags= 0x4004 is the internal private network on office pix.

It is possible configure the home pix to do this, or is impossible without a pubblic ip address on outside interface ??

Thank you,

Question by:Pelitti
    LVL 9

    Accepted Solution

    It most certainly is possible to do this with your home PIX connected to the ADSL router. I have many remote offices that are connected in this way. The small ones of 2-3 temp staff can only justify ADSL broadband.

    The PIX has an outside IP, which is linked to the inside ADSL network, but you need to make sure the ADSL router/modem is configured to be in passthrough mode. This will then 'publish' your outside IP address through and onto your other PIX in your office.

    You need to make sure your PIX does all the firewall work (as it should) as well as DHCP/routing if required for your home network of PC's.

    Hope this helps

    Author Comment

    Passthrough mode. ok i will check. I have only 1 pubblic ip on he router, the outside of my pix is private, so when the vpn start, the caller ip must be natted, it is correct ?

    Thank you,

    Featured Post

    Better Security Awareness With Threat Intelligence

    See how one of the leading financial services organizations uses Recorded Future as part of a holistic threat intelligence program to promote security awareness and proactively and efficiently identify threats.

    Join & Write a Comment

    Suggested Solutions

    The DROP (Spamhaus Don't Route Or Peer List) is a small list of IP address ranges that have been stolen or hijacked from their rightful owners. The DROP list is not a DNS based list.  It is designed to be downloaded as a file, with primary intention…
    This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
    This video is in connection to the article "The case of a missing mobile phone (". It will help one to understand clearly the steps to track a lost android phone.
    In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…

    734 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    26 Experts available now in Live!

    Get 1:1 Help Now