Solved

Cisco Pix with 2 sites connected by Point to Point Tunnels - Need Cisco VPN Client 4.6 to gain access to both sites

Posted on 2006-06-19
2
224 Views
Last Modified: 2010-03-18
Hi There,
I have 2 sites connected to each other via point to point tunnels. Lets call the 2 sits HQ and Branch. The Point to Point VPN is easy enough. However our end users need to be able to connect to HQ via the Cisco VPN client and also have access to the Branch server resources through the one connection. Currently we have 2 Cisco Pix 501's at each site with remote users having to VPN in to each site individually.  I'm aware that the Pix 515 with software release V.7 allows this function, but i'm trying not to buy additional hardware.  Any Ideas or experiences?
0
Comment
Question by:brizk71
2 Comments
 
LVL 4

Expert Comment

by:averyb
ID: 16941751
Not going to be able to do what you want.  

Traffic comes into the outside interface on the PIX from the Internet.  To reach the other site, traffic would have to go back out the outside interface to traverse the VPN tunnel across the Internet. Firewalls do not allow traffic to go back out the same interface it came in on.

0
 
LVL 32

Accepted Solution

by:
rsivanandan earned 200 total points
ID: 16942027
You want to take that 'U' turn, then only 7.x allows that. Can't help it, it was one of the feature introduced. You'll have to live with 2 profiles.

Cheers,
Rajesh
0

Featured Post

Free camera licenses with purchase of My Cloud NAS

Milestone Arcus software is compatible with thousands of industry-leading cameras for added flexibility. Upon installation on your My Cloud NAS, you will receive two (2) camera licenses already enabled in the software. And for a limited time, get additional camera licenses FREE.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

FIPS stands for the Federal Information Processing Standardisation and FIPS 140-2 is a collection of standards that are generically associated with hardware and software cryptography. In most cases, people can refer to this as the method of encrypti…
We recently endured a series of broadcast storms that caused our ISP to shut us down for brief periods of time. After going through a multitude of tests, we determined that the issue was related to Intel NIC drivers on some new HP desktop computers …
This Micro Tutorial demonstrates using Microsoft Excel pivot tables, how to reverse engineer competitors' marketing strategies through backlinks.
Both in life and business – not all partnerships are created equal. As the demand for cloud services increases, so do the number of self-proclaimed cloud partners. Asking the right questions up front in the partnership, will enable both parties …

867 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now