Solved

Cisco Pix with 2 sites connected by Point to Point Tunnels - Need Cisco VPN Client 4.6 to gain access to both sites

Posted on 2006-06-19
2
229 Views
Last Modified: 2010-03-18
Hi There,
I have 2 sites connected to each other via point to point tunnels. Lets call the 2 sits HQ and Branch. The Point to Point VPN is easy enough. However our end users need to be able to connect to HQ via the Cisco VPN client and also have access to the Branch server resources through the one connection. Currently we have 2 Cisco Pix 501's at each site with remote users having to VPN in to each site individually.  I'm aware that the Pix 515 with software release V.7 allows this function, but i'm trying not to buy additional hardware.  Any Ideas or experiences?
0
Comment
Question by:brizk71
2 Comments
 
LVL 4

Expert Comment

by:averyb
ID: 16941751
Not going to be able to do what you want.  

Traffic comes into the outside interface on the PIX from the Internet.  To reach the other site, traffic would have to go back out the outside interface to traverse the VPN tunnel across the Internet. Firewalls do not allow traffic to go back out the same interface it came in on.

0
 
LVL 32

Accepted Solution

by:
rsivanandan earned 200 total points
ID: 16942027
You want to take that 'U' turn, then only 7.x allows that. Can't help it, it was one of the feature introduced. You'll have to live with 2 profiles.

Cheers,
Rajesh
0

Featured Post

Flexible connectivity for any environment

The KE6900 series can extend and deploy computers with high definition displays across multiple stations in a variety of applications that suit any environment. Expand computer use to stations across multiple rooms with dynamic access.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Enterprise networks where VoIP phones have been deployed frequently use port configurations that allow both a computer and an IP phone to be plugged into the same switch port but use different VLANs. On Cisco equipment I'm referring to the "native V…
A common practice in small networks is making file sharing easy which works extremely well when intra-network security is not an issue. In essence, everyone, that is "Everyone", is given access to all of the shared files - often the entire C: drive …
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

828 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question