11-02-2019 09:53 AM - edited 02-21-2020 09:39 AM
Hello -
I need some config help with deploying a Shoretel VPN concentrator in my network. Per the documentation, one leg would be connected to my 2110 on a dedicated DMZ port, the other leg would be connected to my LAN. The config on the 2110 would be done via FDM. How would I create the appropriate NAT and access control policies on my 2110?
I have attached screenshots from the Shoretel documentation. Any help would be appreciated.
Thank You
11-02-2019 08:00 PM
11-03-2019 04:30 AM
If you have multiple public addresses assigned to you from your ISP, you can use an address other that the firewall's public interface address for the Shoretel public NAT address.
I prefer to create the network objects first - like Shoretel-private and Shoretel-private. Then a NAT rule from DMZ-outside. then an ACP entry from outside-DMZ for the destination object Shoretel-private.
Something like this (except use your DMZ zone instead of the inside one I used):
11-03-2019 11:49 AM
11-03-2019 07:11 PM
Generally speaking, if you don't trust your VPN concentrator to be secure (when properly configured) you should be looking at a different vendor's product.
Once you have setup a given trusted vendor per best practices we generally have the working assumption that it is secure (verified by occasional scans, frequent reading of release notes and subscribing to things like vulnerability announcements). Frankly you probably have much greater probability of one of your remote access users either being compromised or malicious. What (if anything) are you doing to protect against that?
11-04-2019 08:12 PM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide