home bbs files messages ]

Forums before death by AOL, social media and spammers... "We can't have nice things"

   comp.dcom.vpn      VPN protocols, clients, awesomeness      2,349 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 1,940 of 2,349   
   Jon Doe to All   
   PIX Help: Got a "scratcher"   
   07 Mar 06 12:20:42   
   
   XPost: comp.dcom.sys.cisco   
   From: jdoe@comcast.net   
      
   I'm really hoping some of the PIX firewall experts might be able to help me   
   here, and I hope my explanation of the situation will be of help.   
      
   The initial scenario is that I'm in companyA, and companyB is a vendor of   
   ours for whom we host servers and other network equipment. When   
   communicating with companyB, we use private IP's instead of going out via   
   the internet. We're able to do this because companyB has a PIX506 firewall   
   who's outside interface is directly connected to one of our (companyA)   
   VLANs. We route the traffic to that outside interface and from there, that   
   PIX506 sends it to a router (also at our location) with a DS3 connection to   
   companyB's main network (offsite).   
      
   In order to reach companyB's PIX506, traffic coming from companyA goes   
   through a PIX525 Firewall via a DMZ with a security level of 1 (so it's the   
   route statements on the PIX525 that sends it out the DMZ to the PIX506). I   
   should also mention that companyA's PIX525 has VPN set up on it. Ok, I   
   really hope this helps... though I'm sure it would've been easier if I knew   
   how to draw and effective picture on here.   
      
   So now here's the problem: this network works fine when the users trying to   
   reach companyB from companyA are coming from the "inside" network of the   
   PIX525. However users using VPN are unable to get there. It seems to me that   
   since VPN users come in from the "outside" interface of the PIX525   
   (security0), they're unable to be sent right back out again through the DMZ   
   (security1).   
      
   Is there any way at all that VPN users (who use the cisco VPN client) might   
   able to go out though this DMZ in question? I should mention here that these   
   VPN users are able to access pretty much everything on the "inside" networks   
   and all the DMZ's on the PIX 525 (we have about 6 DMZ's). My assumption is   
   that this is not going to be possible with the current PIX configuration   
   (using version 6.3(4)). Would PIX version 7.x.x help? Or would moving VPN   
   users off the PIX to something like an ASA5500 help? For now, I've told VPN   
   users to TS into a server on the "inside" network in order for this to work,   
   but I'm desperate for a permanent solution where VPN users will have the   
   same access to companyB that "inside" users do.   
      
   Thanks a lot in advance!   
      
   --- SoupGate-Win32 v1.05   
    * Origin: you cannot sedate... all the things you hate (1:229/2)   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca