<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VPN through Router in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/vpn-through-router/m-p/740588#M1021249</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Ed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First thing that you asked is how to trace traffic ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-&amp;gt; Check your PIX syslog messages and see if client traffic is passing through your router and hitting PIX interface ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-&amp;gt;You can check the netflow traffic on the router by enabling "ip route-cache flow " and you can check the current traffic by "show ip cache flow". If you want to get the netflow data collected offline, you need to have some netflow analyser tool.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and you can troubleshoot where the traffic is getting bloacked and why ? could be any access-list that you have applied on router etc&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Second thing that you have asked is :- is it safe to give public ip on pix outside interface ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, you can do this setup without any problem but you need to be clear about what trafic you are going to permit through PIX.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As fernando said if its client to site vpn setup you may need to enable NAT Traversal, as VPN and NAT by their basic nature donnt gel just like water and oil &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;best bet will be, give your pix a public ip and define your secuirty policies clearly and filter most of traffic on router only like private ips from internet etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH, please rate if it does&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;rgds&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 26 Jul 2007 04:15:01 GMT</pubDate>
    <dc:creator>rajatsetia</dc:creator>
    <dc:date>2007-07-26T04:15:01Z</dc:date>
    <item>
      <title>VPN through Router</title>
      <link>https://community.cisco.com/t5/network-security/vpn-through-router/m-p/740585#M1021246</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was wondering if there is anything I need to do to a router which is infront of my PIX515E.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The setup I have is a PIX515E with a 3660 Router infront of this before the internet. On this router is the public IP addresses which are then nat'ed to ip on the PIX. So for instance my PIX has 10.10.10.1 as i IP on the outside interface card and on the 3660 it will have a static entry to map this to its public ip.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there anything special or extra I need to do on the router to get the traffic through as my client is not connecting. Is there any test i can do to see how far its getting ??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ed&lt;/P&gt;</description>
      <pubDate>Tue, 26 Mar 2019 00:38:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-through-router/m-p/740585#M1021246</guid>
      <dc:creator>edw</dc:creator>
      <dc:date>2019-03-26T00:38:12Z</dc:date>
    </item>
    <item>
      <title>Re: VPN through Router</title>
      <link>https://community.cisco.com/t5/network-security/vpn-through-router/m-p/740586#M1021247</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi  ..  are you trying to connect to the PIX using cisco vpn client ..?  if that is the  case then  you might need to apply an access list to the internal and external interface of the router ...  i.e&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1.- &lt;/P&gt;&lt;P&gt;access-list 100 permit udp any host &lt;PUBLIC ip=""&gt; eq 500&lt;/PUBLIC&gt;&lt;/P&gt;&lt;P&gt;access-list 100 permit udp any host &lt;PUBLIC ip=""&gt; eq 4500&lt;/PUBLIC&gt;&lt;/P&gt;&lt;P&gt;access-list 100 permit esp any host &lt;PUBLIC ip=""&gt;&lt;/PUBLIC&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Add any other access for traffic initiated from the internet and then apply this access list to the outside interface of the router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2.- &lt;/P&gt;&lt;P&gt;access-list 110 permit udp host 10.10.10.1 any eq 500&lt;/P&gt;&lt;P&gt;access-list 110 permit udp host 10.10.10.1 any eq 4500&lt;/P&gt;&lt;P&gt;access-list 110 permit esp host 10.10.10.1 any &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;add any other outbound access you want to allow and then apply the access list to the internal interface of the router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You might also need to enable nat traversal on the PIX  by adding isakmp nat-traversal 20 on the PIX&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope it helps  ..  please rate it if it does  !!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Jul 2007 23:52:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-through-router/m-p/740586#M1021247</guid>
      <dc:creator>Fernando_Meza</dc:creator>
      <dc:date>2007-07-23T23:52:54Z</dc:date>
    </item>
    <item>
      <title>Re: VPN through Router</title>
      <link>https://community.cisco.com/t5/network-security/vpn-through-router/m-p/740587#M1021248</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The router has a very vanillia setup - traffic of all types flows through it without problem ? Unless the router blocks certain ports by default ??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It seems to be becuase I'm trying to NAT to a logical interface on the PIX. I was trying to seperate traffic from each other using virtual interfaces and VLANs. I'm not sure how secure it is giving a PIX a internet IP ??? Can't people hack these boxes easily when they are configured like that ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ed&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Jul 2007 09:54:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-through-router/m-p/740587#M1021248</guid>
      <dc:creator>edw</dc:creator>
      <dc:date>2007-07-24T09:54:37Z</dc:date>
    </item>
    <item>
      <title>Re: VPN through Router</title>
      <link>https://community.cisco.com/t5/network-security/vpn-through-router/m-p/740588#M1021249</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Ed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First thing that you asked is how to trace traffic ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-&amp;gt; Check your PIX syslog messages and see if client traffic is passing through your router and hitting PIX interface ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-&amp;gt;You can check the netflow traffic on the router by enabling "ip route-cache flow " and you can check the current traffic by "show ip cache flow". If you want to get the netflow data collected offline, you need to have some netflow analyser tool.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and you can troubleshoot where the traffic is getting bloacked and why ? could be any access-list that you have applied on router etc&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Second thing that you have asked is :- is it safe to give public ip on pix outside interface ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, you can do this setup without any problem but you need to be clear about what trafic you are going to permit through PIX.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As fernando said if its client to site vpn setup you may need to enable NAT Traversal, as VPN and NAT by their basic nature donnt gel just like water and oil &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;best bet will be, give your pix a public ip and define your secuirty policies clearly and filter most of traffic on router only like private ips from internet etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH, please rate if it does&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;rgds&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Jul 2007 04:15:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-through-router/m-p/740588#M1021249</guid>
      <dc:creator>rajatsetia</dc:creator>
      <dc:date>2007-07-26T04:15:01Z</dc:date>
    </item>
    <item>
      <title>Re: VPN through Router</title>
      <link>https://community.cisco.com/t5/network-security/vpn-through-router/m-p/740589#M1021250</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I managed to get it working. I in the end gave the public IP to the physical interface. I was wondering if its slightly safer giving it to the logical interface ? But I wasn't able to get this to work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My access lists are pretty clear now. I'm pretty anal on these things - but the access list on the router are very vanilla. You say filter private ip from the internet on the router? What do you mean by this ??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also on the PIX how do I limit traffic to each group ?? I use the crypto isakmp match address command but then traffic drops completely and I get a group does not match SA errors?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ed&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Jul 2007 09:52:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-through-router/m-p/740589#M1021250</guid>
      <dc:creator>edw</dc:creator>
      <dc:date>2007-07-26T09:52:48Z</dc:date>
    </item>
    <item>
      <title>Re: VPN through Router</title>
      <link>https://community.cisco.com/t5/network-security/vpn-through-router/m-p/740590#M1021251</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was talking about various security controls which you can apply on internet facing router itself like private ips are not supposed to be present on internet cloud so filter them out on the router itslef i.e. block all the traffic hitting your internet router with private ips as source ...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;similarly you donnt expect public ips allocated to your organisation to come as source, any internet incoming to your router , these public ips will always remain as destination only so block them as source ips at router (anti- spoofing technique)..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you can dig more about these controls , search for keywords "security best practises" at cisco.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;rgds&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Jul 2007 11:57:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-through-router/m-p/740590#M1021251</guid>
      <dc:creator>rajatsetia</dc:creator>
      <dc:date>2007-07-26T11:57:56Z</dc:date>
    </item>
  </channel>
</rss>

