Complex VPN Config - VPN to a network not on the VPN connected device (behind a second firewall)

I have 6 internal 192.168 networks behind a firewall. I need VPN access to these networks but I can't make the firewall itself the VPN endpoint.

I have the following setup.

I have a VPN in place between my office (Cisco PIX506E) and a Cisco 2811 router. I then need to get from the router to the 192.168 networks behind a firewall which I don't directly manage.

+-------------------+                +-------------------+             +---------------------+                 +--------
| PIX506E            |                | 2811                 |             | Firewall              |                  +--------
|Ins |-------------|Ins    |-----------|Ins|--------------+--------
|Out    |                |Out   |              |Out     |                 +--------
+--------------------+               +-------------------+              +--------------------+                 +--------

I have ny VPN setup between two endpoints - and

What static route statements do I need now, and where do I need them, to ensure that I get from the network behind my PIx through to the 192.168.0-5.0/24 networks behind the firewall and back again ? I have tried a number of different configs and haven't yet been able to get this to work.

Also, in my crypto access lists for the traffic to be protected by the VPN, I assume I need to add an entry for the destination 192.168.0-5.0/24 networks, as well as entries for the inside networks on the PIX and 2811.

Any help would be greatly appreciated.

Who is Participating?
The static routes you should need for this is
1. On the 2811, a default route out to the internet and also a route for with a next hop of
2. On the PIX a default route and also routes for with a next hop of

Since the firewall is dealing with decrypted traffic, it will need to pass all traffic between the private networks on either end- from to the others and back. Same for the crypto maps. It doesn't matter what's connected, what matters is the source and destination networks.

If I'm missing something I'm sure someone else will add to this.
Well one way or the other, you will have to make changes to the Firewall that you don't manage to get this setup to work. What is the default gateway of the Firewall ( Is it the 2811 ( And what brand of firewall is

ccfcfcAuthor Commented:
Firewall is proprietary, provided by the ISP. The 2811 is not the gateway for this firewall.

The setup was originally a standard one. For reasons which I won't go into we can't use the ISP firewall for VPN connections. These will all need to go from the PIX to the 2811, and then on to the ISP firewall, and then reversed to go the other way.

The gateway for the 2811 is

The ISP firewall will pass all traffic from 192.168.0-5.0/24 back out to the internet, except for traffic which has been defined as being destined for the VPN, i.e. traffic from the PIX, which will be passed to the 2811 instead of straight back out to the Net.

Increase Security & Decrease Risk with NSPM Tools

Analyst firm, Enterprise Management Associates (EMA) reveals significant benefits to enterprises when using Network Security Policy Management (NSPM) solutions, while organizations without, experienced issues including non standard security policies and failed cloud migrations

ccfcfcAuthor Commented:
I forgot to say, although we have no direct control over the ISP firewall we can request whatever changes are needed to make this configuration work.

Assumption of course is that the ISP firewall does not perform NAT'ing?

Ummm...good point. If those subnets are NATted then you need to substitute the public addresses.
Here's what you need:

PIX 506e:

a) Modify the NAT 0 and Crypto match address access-list so that it includes traffic to to 4.0/24 from
b) As far as routing is concern, there's no need for any explicit static routes to the remote network as long as this PIX
has a default gateway going out to the internet. Of course I am assuming that the PIX 506e is connected to the internet and is on an entirely different location from the 2811.

a) Modify the crypto match address to include traffic to from to 4.0/24.
b) A static route for to 4.0 pointing back to the

Firewall controlled by ISP:

a) You need a static route for pointing back to
b) If your ISP is doing NAT (which is most likely the case, otherwise won't get internet access),
asked them to make a NAT exception rule such that when the network to 4.0/24 communicates with they won't be NATted.

ccfcfcAuthor Commented:
I have amended my configs with the changes above that hadn't been made already.

When I now try to map a drive from a PC on, behind my PIX, to at the other end it seems to almost work. If I go to mapped drives in Explorer I can see the drive listed, but it seems to lock up explorer and I can't actually access the drive. Any ideas on how I can try to diagnose what might be happening ?

Also, how can I configure a Cisco VPN Client to get to the 192.168.0-4.0 networks ? If I have a VPN connection to, I assume that the routing statements already in place as detailed above will get the traffic through to the 192.168.0-4.0 destination, but how does my PC where I'm running the client know to send that traffic down the VPN tunnel instead of straight out to the Net through the normal route ? I don't have an access-list at the VPN Clinet end that will capture that traffic ?

Thanks for all the help so far.
ccfcfcAuthor Commented:
Update -

I mapped a drive from to a PC behind my PIX, on, aand left it running. When I went back a few minutes later the drive mapping was listed in the Disconnect Network Drive under Explorer Tools on, and was also listed as a drive under My Computer.

However, when I click on it to access it Explorer seems to hang. It seems as though traffic is getting across the VPN tunnel but it's running extremely slowly. Any ideas on how I can diagnose where the problem could be ?
>how does my PC where I'm running the client know to send that traffic down the VPN tunnel
The PC has to have the correct route, which is called split tunneling. You can do a route add for now just to test. Most VPN servers can supply the routes to the client, you should look at how to configure it on the 2811 (I don't know). Maybe it's already doing it- try netstat -rn on your PC when the vpn is up and when it's down.

It's possible that if you get that fixed data will flow better too. Let's get that done first. Also make sure that the firewalls on both sides are permitting all IP between the subnets- at least until everything is working and you know what you need.
I'd suggest splitting the points between me and stressedout2004...
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

All Courses

From novice to tech pro — start learning today.