Solved

Virtual Private Network

Posted on 2006-11-20
2
232 Views
Last Modified: 2013-11-16
Hi,

1.Can I create PPTP.L2TP,Remote access IPSEC VPN and Site to Site VPN (IPsec) all 4 in a  single pix 515 or 525 ? if yes is this a right practice?

One Sample configuration please?

2.Can I create Site to Site VPN between Cisco routers(7206,3600,2600) and Cisco PIX (515,525)

One Sample configuration please?

Thanks in advance




0
Comment
Question by:ssshibu
2 Comments
 
LVL 32

Accepted Solution

by:
rsivanandan earned 125 total points
ID: 18000836
1. I would say no, but you can have all IPSEC between sites and remote clients. Works well and config looks decent as well :-)


2. Ofcourse you can;

http://www.ciscotaccc.com/kaidara-advisor/security/showcase?case=K80012970

Cheers,
Rajesh
0

Featured Post

Free Tool: Site Down Detector

Helpful to verify reports of your own downtime, or to double check a downed website you are trying to access.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Free HD cloner 11 88
WD MybookLive Data disappear 6 59
synology Replace Drives to Expand Storage Capacity 8 66
How can I test a Deny All In Firewall rule? 2 14
By default, Carbonite Server Backup manages your encryption key for you using Advanced Encryption Standard (AES) 128-bit encryption. If you choose to manage your private encryption key, your backups will be encrypted using AES 256-bit encryption.
The Delta outage: 650 cancelled flights, more than 1200 delayed flights, thousands of frustrated customers, tens of millions of dollars in damages – plus untold reputational damage to one of the world’s most trusted airlines. All due to a catastroph…
This tutorial will walk an individual through configuring a drive on a Windows Server 2008 to perform shadow copies in order to quickly recover deleted files and folders. Click on Start and then select Computer to view the available drives on the se…
This tutorial will walk an individual through the process of configuring basic necessities in order to use the 2010 version of Data Protection Manager. These include storage, agents, and protection jobs. Launch Data Protection Manager from the deskt…

821 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question