Preview

Cisco - Vpn Configuration

Good Essays
Open Document
Open Document
9191 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cisco - Vpn Configuration
C H A P T E R

7

Site-to-Site VPN Configuration Examples
A site-to-site VPN protects the network resources on your protected networks from unauthorized use by users on an unprotected network, such as the public Internet. The basic configuration for this type of implementation has been covered in Chapter 6, “Configuring IPSec and Certification Authorities.” This chapter provides examples of the following site-to-site VPN configurations:
• • • • •

Using Pre-Shared Keys Using PIX Firewall with a VeriSign CA Using PIX Firewall with an In-House CA Using an Encrypted Tunnel to Obtain Certificates Manual Configuration with NAT

Note

Throughout the examples in this chapter, the local PIX Firewall unit is identified as PIX Firewall 1 while the remote unit is identified as PIX Firewall 2. This designation makes it easier to clarify the configuration required for each.

Using Pre-Shared Keys
This section describes an example configuration for using pre-shared keys. It contains the following topics:
• • •

Scenario Description Configuring PIX Firewall 1 with VPN Tunneling Configuring PIX Firewall 2 for VPN Tunneling

Scenario Description
In the example illustrated in Figure 7-1, the intranets use unregistered addresses and are connected over the public Internet by a site-to-site VPN. In this scenario, NAT is required for connections to the public Internet. However, NAT is not required for traffic between the two intranets, which can be transmitted using a VPN tunnel over the public Internet.

Cisco PIX Firewall and VPN Configuration Guide 78-13943-01

7-1

Chapter 7 Using Pre-Shared Keys

Site-to-Site VPN Configuration Examples

Note

If you do not need to do VPN tunneling for intranet traffic, you can use this example without the access-list or the nat 0 access-list commands. These commands disable NAT for traffic that matches the access list criteria. If you have a limited number of registered IP addresses and you cannot use PAT, you can

You May Also Find These Documents Helpful

  • Satisfactory Essays

    IT220 Lab 7

    • 303 Words
    • 2 Pages

    LAN to LAN tunnels, MPLS network and VPN site to site I would chose the MPLS network its more reliable.…

    • 303 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Cmgt410 Team Paper Riordan

    • 4511 Words
    • 19 Pages

    Laudon, K. C., & Laudon, J. P. (2010). Management Information Systems (11th ed.). Upper Saddle River, NJ: Prentice Hall.…

    • 4511 Words
    • 19 Pages
    Powerful Essays
  • Powerful Essays

    Sometimes users will be able to connect to the remote access VPN server but are unable to connect to any resources on the corporate network. They are unable to resolve host names and unable to even ping resources on the corporate network.…

    • 1528 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Lab 18

    • 490 Words
    • 3 Pages

    In this exercise, you will create a connection that enables the workstation to connect to your server using virtual private networking.…

    • 490 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    To Use or Not to Use a Database? That is the Question. (2013). Retrieved from http://www.htmlgoodies.com/primers/database/article.php/3478121/To-Use-or-Not-to-Use-a-Database-That-is-the-Question.htm…

    • 972 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    enable secret ciscousername local1 privilege 1 password 0 pass1username local2 privilege 1 password 0 pass2memory-size iomem 10!ip subnet-zero!interface FastEthernet0/0 ip address 192.168.100.1 255.255.255.0 ip nat inside duplex auto speed auto!interface Serial0/0 bandwidth 1544 no ip address shutdown!interface FastEthernet0/1 no ip address shutdown duplex auto speed auto!interface Serial0/1 bandwidth 1544 ip address 200.100.10.2 255.255.255.0 ip nat outside ip access-group 100 in!router rip version 2 passive-interface FastEthernet0/0 passive-interface FastEthernet0/1 network 200.100.0.0 network 192.168.100.0!ip nat inside source static 192.168.100.10 10.100.10.10 extendableip nat inside source static 192.168.100.11 10.100.10.11 extendableip classlessip http serverno ip http secure-server!access-list 100 deny ip host 200.100.20.10 any logaccess-list 100 deny ip host 200.100.0.10 any logaccess-list 100 permit ip any any…

    • 349 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    In the LAN-to-WAN domain the internal network is connect to a wide area network. This domain contains routers, firewalls, email content filters, and other similar devices. Routers will route the traffic leaving and coming into the network strict security ACLs will be applied to these devices. Hardware firewalls will be implemented into the network for further packet filtering. Intrusion prevention/detection systems will be on the network to protect against attacks to our network. The email is subject to scanning and filtering to prevent spam, malware, and viruses. (Kim & Solomon, 2012)…

    • 539 Words
    • 3 Pages
    Good Essays
  • Good Essays

    lab 8 Access Controls

    • 943 Words
    • 4 Pages

    1. Where can you store your public keys or public certificate files in the public domain? Is this the same thing as a Public Key Infrastructure (KI) server?…

    • 943 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The Remote Access will provide the Virtual Private Networks with services that the users can use to access the corporate networks over the Internet as it they were directly connected. This remote access will enable the remote…

    • 623 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 7 Answers

    • 1433 Words
    • 6 Pages

    VPN – virtual private network – it provides the functionality of a privately owned secure network without the associate costs of leased telephone lines, satellites, and other communication equipment.…

    • 1433 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    unit 7 lab 10

    • 595 Words
    • 3 Pages

    Software firewalls are installed on individual computers and they need sufficient configuration to be effective. Software firewalls contain a set of related programs, usually located at a network gateway server, that protect the resources of a private network from users on other networks or from internal users. Software firewalls allow application screening to verify the interaction between the requesting client and the requested resource.…

    • 595 Words
    • 3 Pages
    Good Essays
  • Good Essays

    A VPN works well for industries in which the interception of data could give a competitor an unfair advantage. For example, a VPN would be necessary for telecommuting employees who send proprietary data from their home computer to the network at the office,. Perhaps a good place for a VPN would be in a health-care environment, where it is essential that small amounts of data gets point to point without being intercepted and understood by a hacker. There could be many uses where data needs to get point to point with its integrity intact and viewed only by authorized personnel. Law-enforcement agencies, credit card companies, and the military may have numerous applications for VPNs.…

    • 11068 Words
    • 45 Pages
    Good Essays
  • Good Essays

    You can also add the VPN settings to your connection that provides another encryption layer to your network as if anyone remain able to join the network needs hard time to gain access to…

    • 367 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    a. IP Stateful firewall inspection takes place in layer 4, when traffic attempts to traverse the firewall a requested a source port and a destination port pair become part of the session allowing the source to receive information. Stateful inspection firewalls solve the vulnerability of permitting all the high numbered…

    • 928 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    A DS3 is a high-speed business network circuit and is about the same speed as a T1 line.…

    • 1389 Words
    • 6 Pages
    Satisfactory Essays

Related Topics