Solved

IPCOP with 2 Red interfaces

Posted on 2007-12-05
3
3,034 Views
Last Modified: 2009-07-29
I currently run a small network with IPCOP and COP Filter, and use the IPCop VPN to remote offices also running IPCOP Boxes.

I want to set my head office ip cop box up with 2 red NIC's - (2 internet links, 1 x PPPOE, 1 x Realworld IP).

I then want to configure the box to send all traffic except IPSEC and VOIP down the  Real world Link.

Any suggestions on how to do this one?
0
Comment
Question by:itigroup
  • 2
3 Comments
 
LVL 5

Accepted Solution

by:
sardiskan earned 500 total points
ID: 20423094
You should be able to configure just one of the red interfaces to do the IPSec tunnel, after that, the firewall itself should take care of the routing tables so that if a user is requesting an IP address on the other end of the IPSec tunnel it would send it down that pipe. At the very least, you could just add a static route to the firewall to direct IPSec traffic down the IPSec tunnel.
0
 

Author Comment

by:itigroup
ID: 20424562
Yes but what I need to do is put internet traffic down internet link with 1 isp and vpn down internet link with another isp
0
 
LVL 5

Expert Comment

by:sardiskan
ID: 20439294
In IPcop, you will be creating the IPSec tunnel ON one of the two red interfaces. The traffic going out and coming in the IPSec tunnel will have no choice but to go out the only tunnel that has the IPSec tunnel on it, therefor it will be going out whatever ISP you plug into that red interface.
0

Featured Post

Free Tool: Postgres Monitoring System

A PHP and Perl based system to collect and display usage statistics from PostgreSQL databases.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Cisco ASA LDAP Authentication for VPN and Management 8 45
How to safely test out TFTP server software 12 112
ASA5510 Blocking a Wanted Website/Host 9 46
SSL-VPN 1 43
Wikipedia defines 'Script Kiddies' in this informal way: "In hacker culture, a script kiddie, occasionally script bunny, skiddie, script kitty, script-running juvenile (SRJ), or similar, is a derogatory term used to describe those who use scripts or…
I found an issue or “bug” in the SonicOS platform (the firmware controlling SonicWALL security appliances) that has to do with renaming Default Service Objects, which then causes a portion of the system to become uncontrollable and unstable. BACK…
In an interesting question (https://www.experts-exchange.com/questions/29008360/) here at Experts Exchange, a member asked how to split a single image into multiple images. The primary usage for this is to place many photographs on a flatbed scanner…
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

679 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question