?
Solved

Setup IPSec VPN to a Cisco 877 Router sitting behind a Sonicwall TZ105

Posted on 2015-02-05
3
Medium Priority
?
58 Views
Last Modified: 2015-05-09
Hi all,

I am looking for a solution to establish IPSec VPN through a Cisco Router sitting behind Sonicwall.
The client has commissioned a new EOC service which will also allow me to obtain extra IPs if required.
I would appreciate if a solution can be proposed to accomplish this requirement.
0
Comment
Question by:alinknet
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 97

Expert Comment

by:Experienced Member
ID: 40592689
Your Cisco unit should act as both excellent firewall plus VPN Router. I don't think you need the SonicWall at all. I use Cisco and Juniper VPN units, they both act as Firewall, and I do not need an additional unit. Just use the one.

You can put a small fast 8-port switch directly in front of your ISP modem. Then hook up your Cisco Unit to one switch port. If you get another IP, either add another Cisco (or use your SonicWall) or perhaps your Cisco can use two IP addresses. The small business units I have use one IP. But I do use multiple external IP addresses by adding other VPN routers. No issue.
0
 
LVL 3

Accepted Solution

by:
Stephen Berk earned 1500 total points
ID: 40592855
I'm not familiar with the Sonicwall, but all you should need to do is get VPN passthrough working. Here's another EE post on the topic, it might help: http://www.experts-exchange.com/Hardware/Networking_Hardware/Firewalls/Q_25009379.html#a26148496
0
 

Author Comment

by:alinknet
ID: 40768134
Thank Guys,
Manage to setup a pass through on the Cisco.
0

Featured Post

Ransomware Attacks Keeping You Up at Night?

Will your organization be ransomware's next victim?  The good news is that these attacks are predicable and therefore preventable. Learn more about how you can  stop a ransomware attacks before encryption takes place with our Ransomware Prevention Kit!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Quality of Service (QoS) options are nearly endless when it comes to networks today. This article is merely one example of how it can be handled in a hub-n-spoke design using a 3-tier configuration.
PRTG Network Monitor lets you monitor your bandwidth usage, so you know who is using up your bandwidth, and what they're using it for.
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Suggested Courses

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question