<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Network Security for a department in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/network-security-for-a-department/m-p/2058343#M396132</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi jeniffer,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Thank you for the quick solution .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Can you please clarify the following &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group 172.17.63.230 type &lt;STRONG&gt;ipsec-l2l&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;tunnel-group 172.17.63.230 ipsec-attributes&lt;/P&gt;&lt;P&gt;pre-shared-key *&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here the above preshared key is &lt;STRONG&gt;cisco123 &lt;/STRONG&gt;the same we configured in the router &lt;STRONG&gt; ? &lt;/STRONG&gt;What is the significance of the line &lt;/P&gt;&lt;P&gt;tunnel-group 172.17.63.230 type &lt;STRONG&gt;ipsec-l2l.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 06 Nov 2012 12:21:55 GMT</pubDate>
    <dc:creator>shameer sa</dc:creator>
    <dc:date>2012-11-06T12:21:55Z</dc:date>
    <item>
      <title>Network Security for a department</title>
      <link>https://community.cisco.com/t5/network-security/network-security-for-a-department/m-p/2058338#M396121</link>
      <description>&lt;P&gt;Hi all ,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Please go through my network diagram &lt;/P&gt;&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/legacy/9/7/1/110179-123.jpg" alt="123.jpg" class="jive-image" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am using ospf in the network .I only mentioned some of the routers in the diagram .&lt;/P&gt;&lt;P&gt;Consider a Department A which is having a branch connected to Router R3 and to some other routers through E1 links&amp;nbsp;&amp;nbsp; which is no mentioned here .&lt;/P&gt;&lt;P&gt;Department A is having servers in the DMZ Zone of the firewall .&lt;/P&gt;&lt;P&gt;I need to add security features(Ipsec) to the department A network either though firewall or through routers .Here consider 192.168.2.0/24 in the R3 as department A network .Need to provide ipsec or any other security features to 192.168.2.0/24 network only not to the whole R3 network .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Routers Cisco&amp;nbsp; 7206 ,7204&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:18:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/network-security-for-a-department/m-p/2058338#M396121</guid>
      <dc:creator>shameer sa</dc:creator>
      <dc:date>2019-03-12T00:18:32Z</dc:date>
    </item>
    <item>
      <title>Network Security for a department</title>
      <link>https://community.cisco.com/t5/network-security/network-security-for-a-department/m-p/2058339#M396122</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can configure LAN-to-LAN IPSec VPN between R3 and the PIX 525 firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What version is your PIX firewall?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is a few sample configuration for your reference:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a00805e8c80.shtml"&gt;http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a00805e8c80.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a0080094498.shtml"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a0080094498.shtml&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 03 Nov 2012 11:00:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/network-security-for-a-department/m-p/2058339#M396122</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-11-03T11:00:44Z</dc:date>
    </item>
    <item>
      <title>Network Security for a department</title>
      <link>https://community.cisco.com/t5/network-security/network-security-for-a-department/m-p/2058340#M396123</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jennifer ,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Thanx for the quick reply .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My pix version is&amp;nbsp; PIX Version 7.0(7) .&lt;/P&gt;&lt;P&gt;The document i will check and will reply &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Nov 2012 06:18:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/network-security-for-a-department/m-p/2058340#M396123</guid>
      <dc:creator>shameer sa</dc:creator>
      <dc:date>2012-11-06T06:18:25Z</dc:date>
    </item>
    <item>
      <title>Network Security for a department</title>
      <link>https://community.cisco.com/t5/network-security/network-security-for-a-department/m-p/2058341#M396126</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi jennifer ,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; I understood the router part configuration .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; Let me clear a point &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the pix ,servers are in the &lt;STRONG&gt;server&lt;/STRONG&gt; zone whose security Level&amp;nbsp; is 95 and wan network in &lt;STRONG&gt;W AN&lt;/STRONG&gt; zone and security level is 91. The ipsec is to be enable in &lt;STRONG&gt;WAN &lt;/STRONG&gt;zone interface&amp;nbsp; for a particulaR traffic .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Ethernet4&lt;/P&gt;&lt;P&gt; speed 100&lt;/P&gt;&lt;P&gt; duplex full&lt;/P&gt;&lt;P&gt; nameif &lt;STRONG&gt;WAN&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt; security-level 91&lt;/P&gt;&lt;P&gt; ip address x.x.x.x y.y.y.y&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet5&lt;/P&gt;&lt;P&gt; speed 100&lt;/P&gt;&lt;P&gt; duplex full&lt;/P&gt;&lt;P&gt; nameif &lt;STRONG&gt;SERVER &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt; security-level 95&lt;/P&gt;&lt;P&gt; ip address X.X.X.X Y.Y.Y.Y&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;I had read the following link &lt;/P&gt;&lt;P&gt;&lt;A class="active_link" href="http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a00805e8c80.shtml"&gt;http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a00805e8c80.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I had totally confused with PIX&amp;nbsp; part .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="active_link" name="t1" style="color: #000000; font-size: 12px;"&gt; &lt;/A&gt;&lt;/P&gt;&lt;TABLE bgcolor="#FFFFFF" border="1" cellpadding="3" cellspacing="1" style="width: 60%; "&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD bgcolor="#FFFFFF"&gt;&lt;PRE style="font-size: 15px;"&gt;&lt;STRONG&gt;crypto ipsec transform-set avalanche esp-des esp-md5-hmac 
crypto ipsec security-association lifetime seconds 3600
crypto ipsec df-bit clear-df outside
crypto map forsberg 21 match address Ipsec-conn
crypto map forsberg 21 set peer 172.17.63.230 
crypto map forsberg 21 set transform-set avalanche
crypto map forsberg interface outside &lt;/STRONG&gt;&lt;/PRE&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group &lt;STRONG&gt;172.17.63.230&lt;/STRONG&gt; type ipsec-l2l&lt;/P&gt;&lt;P&gt;tunnel-group 172.17.63.230 ipsec-attributes&lt;/P&gt;&lt;P&gt;pre-shared-key *&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above configuration is mentioning about one branch router and its ip &lt;STRONG style="font-size: 15px;"&gt;172.17.63.230. &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-size: 15px;"&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt; But i had 14 branch routers .Then what is the change in the network configuration also what is the significance of &lt;/P&gt;&lt;P&gt;&lt;A name="t1" style="color: #000000; font-size: 12px;"&gt; &lt;/A&gt;&lt;/P&gt;&lt;TABLE bgcolor="#FFFFFF" border="1" cellpadding="3" cellspacing="1" width="60%"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD bgcolor="#FFFFFF"&gt;&lt;PRE style="font-size: 15px;"&gt;&lt;STRONG&gt;access-list nonat extended permit ip 10.1.1.0 255.255.255.0 10.2.2.0 255.255.255.0&lt;/STRONG&gt; &lt;/PRE&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;A name="t1" style="color: #000000; font-size: 12px;"&gt; &lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;.Here my traffic is not to the outside interface but only to the intranet .&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Nov 2012 11:49:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/network-security-for-a-department/m-p/2058341#M396126</guid>
      <dc:creator>shameer sa</dc:creator>
      <dc:date>2012-11-06T11:49:18Z</dc:date>
    </item>
    <item>
      <title>Network Security for a department</title>
      <link>https://community.cisco.com/t5/network-security/network-security-for-a-department/m-p/2058342#M396129</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In your case, instead of terminating the IPSec tunnel on outside interface, you just have to change the interface to match your requirement, which is on the WAN interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have 14 branch routers, are you planning to build IPSec VPN from all the 14 branch routers?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are, then you just have to configure the crypto map with different sequence number. As per the above, the crypto map sequence number is 21, in your case, you can just configure 1 sequence number per branch router that you woudl like to build the VPN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The crypto ACl must match the subnet local to PIX towards the remote subnet on the branch router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The NONAT access-list is to bypass translation for those internal subnets.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Nov 2012 11:54:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/network-security-for-a-department/m-p/2058342#M396129</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-11-06T11:54:23Z</dc:date>
    </item>
    <item>
      <title>Network Security for a department</title>
      <link>https://community.cisco.com/t5/network-security/network-security-for-a-department/m-p/2058343#M396132</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi jeniffer,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Thank you for the quick solution .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Can you please clarify the following &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group 172.17.63.230 type &lt;STRONG&gt;ipsec-l2l&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;tunnel-group 172.17.63.230 ipsec-attributes&lt;/P&gt;&lt;P&gt;pre-shared-key *&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here the above preshared key is &lt;STRONG&gt;cisco123 &lt;/STRONG&gt;the same we configured in the router &lt;STRONG&gt; ? &lt;/STRONG&gt;What is the significance of the line &lt;/P&gt;&lt;P&gt;tunnel-group 172.17.63.230 type &lt;STRONG&gt;ipsec-l2l.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Nov 2012 12:21:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/network-security-for-a-department/m-p/2058343#M396132</guid>
      <dc:creator>shameer sa</dc:creator>
      <dc:date>2012-11-06T12:21:55Z</dc:date>
    </item>
    <item>
      <title>Network Security for a department</title>
      <link>https://community.cisco.com/t5/network-security/network-security-for-a-department/m-p/2058344#M396135</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The line: &lt;STRONG&gt;tunnel-group 172.17.63.230 type ipsec-l2l&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;will create the tunnel-group for the ipsec-l2l (ipsec-lan to lan) so you can configure attributes for this particular ipsec peer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And yes, it is the same as the router where we configure the preshared key.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Nov 2012 02:01:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/network-security-for-a-department/m-p/2058344#M396135</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-11-07T02:01:51Z</dc:date>
    </item>
  </channel>
</rss>

