Solved

Sonicwall to Barracuda Site to Site VPN

Posted on 2014-01-23
1
1,439 Views
Last Modified: 2014-01-23
Hi everyone.  Have a fun question I wanted to ask.  I am getting ready to replace our Sonicwall NSA 3500 with a Barracuda x300 Firewall.  On a couple mobile units we have some Sonicwall Tz210w devices that connect via IPSec VPN Tunnel back to our main location.  Since these devices use Verizon Data cards, therefor Dynamic IP Addresses, I have them setup using Aggressive mode and the Firewall Identifier for the IKE ID.  This apparently won't work with the Barracuda and I wondered what other options I have.  Obviously IP Addresses are out of the question as well.  I was going to forward all IPsec traffic using Nat-T to bypass the Barracuda and continue using the Sonicwall for VPN connectivity for the time being, but that wouldn't work either (even though the Barracuda said it was passing the traffic).  Any help is greatly appreciated, as I have the rest of the Barracuda setup and would love to have it in place this weekend.  Thank you very  much.
0
Comment
Question by:cmhtech
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 

Accepted Solution

by:
cmhtech earned 0 total points
ID: 39804833
Nevermind, Just found out I have another IP Address I can use and have the SonicwallVPN on that external IP.
0

Featured Post

Free NetCrunch network monitor licenses!

Only on Experts-Exchange: Sign-up for a free-trial and we'll send you your permanent license!

Here is what you get: 30 Nodes | Unlimited Sensors | No Time Restrictions | Absolutely FREE!

Act now. This offer ends July 14, 2017.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…
Michael from AdRem Software outlines event notifications and Automatic Corrective Actions in network monitoring. Automatic Corrective Actions are scripts, which can automatically run upon discovery of a certain undesirable condition in your network.…

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question