home bbs files messages ]

Forums before death by AOL, social media and spammers... "We can't have nice things"

   comp.dcom.vpn      VPN protocols, clients, awesomeness      2,348 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 1,444 of 2,348   
   Mike Drechsler - SPAM PROTECTED EMA to All   
   Re: PIX to multi IOS router VPN routing    
   23 Jan 05 08:22:37   
   
   From: mike-newsgroup@-DELETETHISPART-.upcraft.com   
      
   m0j0 wrote:   
   > I'm implementing a star VPN with a PIX running v6.3 as the central   
   > termination point and multiple Cisco 837 at the remote offices (all   
   > running IOS v12.3).   
   >   
   > The question I have is regarding remote site to remote site   
   > communications.  Is it possible to route from one site to another   
   > through the PIX or am I required to configure a meshed network?  At   
   > this stage, I have everything working except for this one thing.  The   
   > amount of traffic between the two sites will be minimal so I'm loathe   
   > to go through the hassle of setting up all the tunnels, however it's   
   > still going to be a requirement.   
      
   Great question.  Answer: Yes   
      
   The logic behind doing a star network with IPSec is a little strange but   
   it works.  This description is very general and works with all IPSec   
   compatible equipment.  I don't work with Cisco PIX devices often so I   
   can not give specific configurations for the Cisco platform.  The   
   concept should be easy enough to grasp though.   
      
   Your network numbering should be very uniform for this to work simply.   
   Adding more numbering schemes will complicate things since you will need   
   to add extra tunnels so lets keep it simple.  So just pick a format and   
   stick with it on all sites including your central site.  For example.   
   If you use the most popular private network address scheme 192.168.x.x   
   then all the sites need to use this convention.  If your network is   
   going to grow beyond 254 sites then perhaps consider starting with   
   10.x.x.x for maximum growth and flexibility due to this subnet's much   
   larger size.   
      
   In our example your central site will be numbered: 10.0.0.x   
   Branch office 1: 10.0.1.x   
   Branch office 2: 10.0.2.x   
   Branch office 3: 10.0.3.x   
      
   The tunnel between branch office 1 and the central site will be   
   basically the same as any point to point IPsec connection but the local   
   and remote subnet definitions are going to be a bit different, that's   
   it.  Encryption settings, phase 1 settings, etc are not involved and can   
   be however you like but I assume you already have those working.   
   In the central office the tunnel to branch office 1 looks like this:   
   Local subnet: 10.0.0.0/255.0.0.0   
   Remote subnet: 10.0.1.0/255.255.255.0   
      
   In the branch office 1 router the tunnel IP configuration looks like this:   
   Local subnet: 10.0.1.0/255.255.255.0   
   Remote subnet: 10.0.0.0/255.0.0.0   
      
   Notice how the central site subnet is defined as the entire range of   
   addresses in the 10.x.x.x range?  This is what makes the remote site   
   send all traffic to any subnet in the 10.x.x.x range that is not local   
   to the central site router.  The central router will look up the   
   destination and if it's not a local subnet it will forward it again to   
   the correct branch office tunnel.   
      
   That's it.  Just change your subnet definitions on your tunnels so the   
   central site contains all the branch subnets and it will work.   
      
   Another suggestion, if possible avoid using 192.168.0.x or 192.168.1.x   
   in any of your networks.  Home network gear often uses these numbers by   
   default and it will make life easier on your remote users if they want   
   to run a VPN client from home behind a router with these common network   
   numbers.   
      
   --   
   WARNING!  Email address has been altered for spam resistance.   
   Please remove the -deletethispart-. section before replying directly.   
   Mike Drechsler (mike-newsgroup@-deletethispart-.upcraft.com)   
      
   --- SoupGate-Win32 v1.05   
    * Origin: you cannot sedate... all the things you hate (1:229/2)   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca