<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Pix routing Branch offices and IPsec in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-routing-branch-offices-and-ipsec/m-p/389375#M1059515</link>
    <description>&lt;P&gt;We have a main site with a Pix 506 and an fixed IP, 3  branch offices are connected via internet with that PIX in Ipsec with 837 routers in each branch office.&lt;/P&gt;&lt;P&gt;Each branch office is on a different subnet and is working like a charm, everybody can get the servers on the main site.&lt;/P&gt;&lt;P&gt;Now we want to connect hosts between subnets, as the Ipsec is terminated on the same PIX interface it is impossible.&lt;/P&gt;&lt;P&gt;Have you a way to add a router ( 831 for ex.) to connect the differents subnets and to correct the behaviour of the PIX. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The main site is 192.68.0.0/254&lt;/P&gt;&lt;P&gt;each branch office is 10.10.11.0&lt;/P&gt;&lt;P&gt;                       10.10.12.0 &lt;/P&gt;&lt;P&gt;                       10.10.12.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Waiting for any idea ( we dont want a VPN concentrator, we perfer to by a generic router  ) &lt;/P&gt;&lt;P&gt;regards &lt;/P&gt;&lt;P&gt;Loïc&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 07:52:21 GMT</pubDate>
    <dc:creator>loic.moreau</dc:creator>
    <dc:date>2020-02-21T07:52:21Z</dc:date>
    <item>
      <title>Pix routing Branch offices and IPsec</title>
      <link>https://community.cisco.com/t5/network-security/pix-routing-branch-offices-and-ipsec/m-p/389375#M1059515</link>
      <description>&lt;P&gt;We have a main site with a Pix 506 and an fixed IP, 3  branch offices are connected via internet with that PIX in Ipsec with 837 routers in each branch office.&lt;/P&gt;&lt;P&gt;Each branch office is on a different subnet and is working like a charm, everybody can get the servers on the main site.&lt;/P&gt;&lt;P&gt;Now we want to connect hosts between subnets, as the Ipsec is terminated on the same PIX interface it is impossible.&lt;/P&gt;&lt;P&gt;Have you a way to add a router ( 831 for ex.) to connect the differents subnets and to correct the behaviour of the PIX. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The main site is 192.68.0.0/254&lt;/P&gt;&lt;P&gt;each branch office is 10.10.11.0&lt;/P&gt;&lt;P&gt;                       10.10.12.0 &lt;/P&gt;&lt;P&gt;                       10.10.12.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Waiting for any idea ( we dont want a VPN concentrator, we perfer to by a generic router  ) &lt;/P&gt;&lt;P&gt;regards &lt;/P&gt;&lt;P&gt;Loïc&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 07:52:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-routing-branch-offices-and-ipsec/m-p/389375#M1059515</guid>
      <dc:creator>loic.moreau</dc:creator>
      <dc:date>2020-02-21T07:52:21Z</dc:date>
    </item>
    <item>
      <title>Re: Pix routing Branch offices and IPsec</title>
      <link>https://community.cisco.com/t5/network-security/pix-routing-branch-offices-and-ipsec/m-p/389376#M1059516</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The easiest way would be to just replace the hub PIX with the 837, as it will re-route traffic between the spoke sites.  You can purchase the IOSFW feature set for the 837 and turn it into a firewall also for security of your main site.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The crypto ACL on each spoke site would then just be:&lt;/P&gt;&lt;P&gt;&lt;B&gt;&lt;/B&gt;&lt;/P&gt;&lt;P&gt;access-list 100 permit ip 10.10.11.0 0.0.0.255 10.0.0.0 0.255.255.255&lt;/P&gt;&lt;P&gt;access-list 100 permit ip 10.10.11.0 0.0.0.255 192.168.0.0 0.0.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and on the main hub 837 you'd have something like the following:&lt;/P&gt;&lt;P&gt;&lt;B&gt;&lt;/B&gt;&lt;/P&gt;&lt;P&gt;crypto map mymap 10 ipsec-isakmp&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; set peer spokeA&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;match address 100&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;...&lt;/P&gt;&lt;P&gt;crypto map mymap 20 ipsec-isakmp&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; set peer spokeB&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;match address 101&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;...&lt;/P&gt;&lt;P&gt;crypto map mymap 30 ipsec-isakmp&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; set peer spokeC&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;match address 102&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 100 permit ip 10.0.0.0 0.255.255.255 10.10.11.0 0.0.0.255&lt;/P&gt;&lt;P&gt;access-list 100 permit ip 192.168.0.0 0.0.255.255 10.10.11.0 0.0.0.255&lt;/P&gt;&lt;P&gt;access-list 101 permit ip 10.0.0.0 0.255.255.255 10.10.12.0 0.0.0.255&lt;/P&gt;&lt;P&gt;access-list 100 permit ip 192.168.0.0 0.0.255.255 10.10.12.0 0.0.0.255&lt;/P&gt;&lt;P&gt;access-list 102 permit ip 10.0.0.0 0.255.255.255 10.10.13.0 0.0.0.255&lt;/P&gt;&lt;P&gt;access-list 100 permit ip 192.168.0.0 0.0.255.255 10.10.13.0 0.0.0.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In other words, set up each spoke to encrypt traffic from its local network to the entire 10.0.0.0/8 net and to the 192.168.0.0 net.  This way each spoke will route traffic for any other spoke (provided it's a 10.0.0.0 subnet) to the hub, and the hub will re-route it back out based on it's other acl's.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, if these 3 hub sites are generating a large amount of traffic then you might want to look at something beefier than an 837 for the hub, but then again if a 506 is currently handling the load OK, an 837 should have no problem.  Keep in mind that it is going to be decrypting/encrypting spoke-to-spoke traffic twice so it will have extra load than the 506 currently has.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Jan 2005 23:44:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-routing-branch-offices-and-ipsec/m-p/389376#M1059516</guid>
      <dc:creator>gfullage</dc:creator>
      <dc:date>2005-01-17T23:44:49Z</dc:date>
    </item>
    <item>
      <title>Re: Pix routing Branch offices and IPsec</title>
      <link>https://community.cisco.com/t5/network-security/pix-routing-branch-offices-and-ipsec/m-p/389377#M1059517</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have just ordered a 1712 for that purpose to our volume reseller. As it is equipped with VPN hardware, I think it will be enough and may be more appropriate than a 837. For a little time i had looked for a 2611 but our branch offices have 2/3 peoples per site and so i compromised with the model 1712. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a bit anticipated your response in crawling in Google, I found some indication about hub and spoke configs, and so i know already that i have to give up my 506  .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks for your config, i was a bit in trouble, I will test when i receive my 1712 and will give you the results.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;best regards &lt;/P&gt;&lt;P&gt;Loïc&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Jan 2005 07:45:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-routing-branch-offices-and-ipsec/m-p/389377#M1059517</guid>
      <dc:creator>loic.moreau</dc:creator>
      <dc:date>2005-01-18T07:45:53Z</dc:date>
    </item>
    <item>
      <title>Re: Pix routing Branch offices and IPsec</title>
      <link>https://community.cisco.com/t5/network-security/pix-routing-branch-offices-and-ipsec/m-p/389378#M1059518</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The spokes are not communicating each others &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I supose that i have missed something &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;here is the hub 1710 config &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sh conf&lt;/P&gt;&lt;P&gt;Using 2844 out of 29688 bytes&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;version 12.3&lt;/P&gt;&lt;P&gt;service timestamps debug datetime msec&lt;/P&gt;&lt;P&gt;service timestamps log datetime msec&lt;/P&gt;&lt;P&gt;service password-encryption&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname router1700&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot-start-marker&lt;/P&gt;&lt;P&gt;boot-end-marker&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;logging buffered 51200 warnings&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;mmi polling-interval 60&lt;/P&gt;&lt;P&gt;no mmi auto-configure&lt;/P&gt;&lt;P&gt;no mmi pvc&lt;/P&gt;&lt;P&gt;mmi snmp-timeout 180&lt;/P&gt;&lt;P&gt;no aaa new-model&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;no ip domain lookup&lt;/P&gt;&lt;P&gt;ip domain name yourdomain.com&lt;/P&gt;&lt;P&gt;ip cef&lt;/P&gt;&lt;P&gt;ip ids po max-events 100&lt;/P&gt;&lt;P&gt;no ftp-server write-enable&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto isakmp policy 1&lt;/P&gt;&lt;P&gt; hash md5&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt;crypto isakmp key xxxx address 0.x.x.x.x.0.0&lt;/P&gt;&lt;P&gt;crypto isakmp keepalive 10 5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set rtpset esp-des esp-md5-hmac &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto dynamic-map rtpmap 10&lt;/P&gt;&lt;P&gt; set transform-set rtpset &lt;/P&gt;&lt;P&gt; match address 115&lt;/P&gt;&lt;P&gt;crypto dynamic-map rtpmap 20&lt;/P&gt;&lt;P&gt; set transform-set rtpset &lt;/P&gt;&lt;P&gt; match address 116&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto map rtptrans 10 ipsec-isakmp dynamic rtpmap &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vif1&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface BRI0&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no cdp enable&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0&lt;/P&gt;&lt;P&gt; ip address 100.100.100.205 255.255.255.248&lt;/P&gt;&lt;P&gt; ip nat outside&lt;/P&gt;&lt;P&gt; ip virtual-reassembly&lt;/P&gt;&lt;P&gt; no ip route-cache cef&lt;/P&gt;&lt;P&gt; no ip route-cache&lt;/P&gt;&lt;P&gt; duplex auto&lt;/P&gt;&lt;P&gt; speed auto&lt;/P&gt;&lt;P&gt; no cdp enable&lt;/P&gt;&lt;P&gt; crypto map rtptrans&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet1&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; no cdp enable&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet2&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; no cdp enable&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet3&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; no cdp enable&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet4&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; no cdp enable&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; description $ETH-SW-LAUNCH$$INTF-INFO-HWIC 4ESW$&lt;/P&gt;&lt;P&gt; ip address 192.168.0.11 255.255.255.0&lt;/P&gt;&lt;P&gt; ip nat inside&lt;/P&gt;&lt;P&gt; ip virtual-reassembly&lt;/P&gt;&lt;P&gt; no ip route-cache cef&lt;/P&gt;&lt;P&gt; no ip route-cache&lt;/P&gt;&lt;P&gt; ip tcp adjust-mss 1452&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip classless&lt;/P&gt;&lt;P&gt;ip route 0.0.0.0 x.x.x.x.100.100.201&lt;/P&gt;&lt;P&gt;ip route 10.10.11.0 255.255.255.0 10.10.11.1&lt;/P&gt;&lt;P&gt;ip route 10.10.12.0 255.255.255.0 10.10.12.1&lt;/P&gt;&lt;P&gt;ip http server&lt;/P&gt;&lt;P&gt;ip http authentication local&lt;/P&gt;&lt;P&gt;ip http secure-server&lt;/P&gt;&lt;P&gt;ip nat inside source route-map nonat interface FastEthernet0 overload&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-list 115 permit ip 192.168.0.0 0.0.0.255 10.10.11.0 0.0.0.255&lt;/P&gt;&lt;P&gt;access-list 115 permit ip 10.0.0.0 0.255.255.255 10.10.11.0 0.0.0.255&lt;/P&gt;&lt;P&gt;access-list 116 permit ip 192.168.0.0 0.0.0.255 10.10.12.0 0.0.0.255&lt;/P&gt;&lt;P&gt;access-list 116 permit ip 10.0.0.0 0.255.255.255 10.10.12.0 0.0.0.255&lt;/P&gt;&lt;P&gt;access-list 120 deny   ip 192.168.0.0 0.0.0.255 10.10.12.0 0.0.0.255&lt;/P&gt;&lt;P&gt;access-list 120 deny   ip 10.0.0.0 0.255.255.255 10.0.0.0 0.255.255.255&lt;/P&gt;&lt;P&gt;no cdp run&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;route-map nonat permit 10&lt;/P&gt;&lt;P&gt; match ip address 120&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;control-plane&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;banner login ^Config du 18/01/2005 &lt;/P&gt;&lt;P&gt;^C&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;line con 0&lt;/P&gt;&lt;P&gt; login local&lt;/P&gt;&lt;P&gt;line aux 0&lt;/P&gt;&lt;P&gt;line vty 0 4&lt;/P&gt;&lt;P&gt; privilege level 15&lt;/P&gt;&lt;P&gt; login local&lt;/P&gt;&lt;P&gt; transport input telnet ssh&lt;/P&gt;&lt;P&gt;line vty 5 15&lt;/P&gt;&lt;P&gt; privilege level 15&lt;/P&gt;&lt;P&gt; login local&lt;/P&gt;&lt;P&gt; transport input telnet ssh&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;router1700# &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 Feb 2005 19:46:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-routing-branch-offices-and-ipsec/m-p/389378#M1059518</guid>
      <dc:creator>loic.moreau</dc:creator>
      <dc:date>2005-02-17T19:46:42Z</dc:date>
    </item>
  </channel>
</rss>

