Go Premium for a chance to win a PS4. Enter to Win

x
  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 452
  • Last Modified:

Cisco routing with Sonicwall

ok this is what I have, basically have a couple remotes sites that are still using Sonicwall to terminate a P2P fiber connection.  I have some Cisco 871's in hand that I want to replace those sonicwalls with.  The main Site still uses A sonicwall to terminate the fiber and internet filtering.  So basically its setup like this on the sonicwalls at the remote site currently

LAN ip 192.168.5.1
WAN ip 192.168.11.1    Main Site 192.168.11.2 (p2p Fiber)
the main site also terminates all MPLS circuits so we have additional subnets behind the main site sonic wall  192.168.6.0 192.168.3.0 192.168.8.0 192.168.2.0 192.168.10.0.  right now i create address objects in the sonicwall for each subnet, and then route to those subnets through the Main site P2P link (192.168.11.2)  Can the Cisco work with the sonicwall in this way?
0
jasonmichel
Asked:
jasonmichel
  • 2
  • 2
1 Solution
 
SorensonCommented:
From your description it sounds like the sonicwalls are simply routing traffic, this would be a little more complicated if they are doing nat / firewalling, but the 871 can do both.

The 871 should be able to do what you are asking.  You would create the LAN and WAN ip addresses, then add static routes for each of the remote networks (via the main site ip address.
0
 
jasonmichelAuthor Commented:
would i need to create an ACL for each remote subnet?
0
 
SorensonCommented:
that would depend on the security setup you need.  For simply routing the traffic, no, you would not need an acl, just a static route.  If you want to control / limit traffic, or you will be doing nat / firewalling, then you will need to create acls, create nat statements, etc.
0
 
jasonmichelAuthor Commented:
ok, so this is what the config looks like...any issues?


Current configuration : 1001 bytes
!
version 12.4
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname Router
!
boot-start-marker
boot-end-marker
!
no logging console
!
no aaa new-model
!
resource policy
!
ip subnet-zero
ip cef
!
!
!
!
!
!
!
!
!
!
interface FastEthernet0
!
interface FastEthernet1
!
interface FastEthernet2
!
interface FastEthernet3
!
interface FastEthernet4
 ip address 192.168.11.1 255.255.255.0
 duplex auto
 speed auto
!
interface Vlan1
 ip address 192.168.5.1 255.255.255.0
!
ip classless
ip route 192.168.1.0 255.255.255.0 192.168.11.2
ip route 192.168.2.0 255.255.255.0 192.168.11.2
ip route 192.168.3.0 255.255.255.0 192.168.11.2
ip route 192.168.6.0 255.255.255.0 192.168.11.2
ip route 192.168.8.0 255.255.255.0 192.168.11.2
ip route 192.168.10.0 255.255.255.0 192.168.11.2
!
no ip http server
no ip http secure-server
!
!
control-plane
!
!
line con 0
 no modem enable
line aux 0
line vty 0 4
!
scheduler max-task-time 5000
end



192.168.11.2 is the other side of the p2p fiber, 11.1 is local to the router
0

Featured Post

[Webinar] Cloud and Mobile-First Strategy

Maybe you’ve fully adopted the cloud since the beginning. Or maybe you started with on-prem resources but are pursuing a “cloud and mobile first” strategy. Getting to that end state has its challenges. Discover how to build out a 100% cloud and mobile IT strategy in this webinar.

  • 2
  • 2
Tackle projects and never again get stuck behind a technical roadblock.
Join Now