We have 4 remote locations, all these locations are connected to Head Office via Site to site VPN tunnels, i have one tunnel to each location form head office,
HQ 10.10.1.0/24 (Cisco 851)
Site 1 10.10.2.0/24 (Cisco 861)
Site 2 10.10.4.0/24 (Cisco 861)
Site 3 192.168.10.0/24 (Linksys RV4102)
Site 4 192.168.1.0/24 (Some Linksys )
We are using these VPN tunnels for IP phones at remote locations, Every thing works fine except when some body want to make a call form any remote locations to another remote location e..g site 1 call site 2 there is no audio, to over come this problem we need to a fully mesh network, each location should be able to access each other or in other words we can say that i should be able to ping LAN IP of Site 1 form Site 2, so to get it working i need to create vpn tunnel form each location to each location, in that way we have to create 4 tunnels in each router, or we can have DMVPN, but due to mix of equipments we cant have DMVPN, because only cisco 851 supports DMVPN, not even cisco 861)
So my question to all experts is that there is any way i can do some thing in HQ, so that it can route traffic from one remote site to another site, or it can work as hub so that i dont have to create 4 vpn tunnels in each router, because of the cisco 851 and cisco 861, i can have only 5 VPN tunnels, if i will create 4 VPN tunnels in each router i will be ran out very soon,
I am attaching the Edited Running config of HQ router, Sorry i edited it due to security reasons
For all versions of the Email Security Appliance (ESA) and Security Management Appliance (SMA), some Secure Sockets Link (SSL) certificates issued from the QuoVadis root certificate authority (CA) trust chain before 2021-03-31 cannot b...
Automation and programmability for networking and security are increasingly important topics. Every release since ISE 1.2 has included new REST API capabilities to better automate and integrate ISE with the rest of your network, appli...
The latest iteration (v2.3.4) of the Cisco Secure Firewall Migration Tool adds public beta support for S2S VPN migrations from ASA:
Policy-based (crypto map) Pre-Shared key authentication type VPN configuration to Firepower Management Center
Cisco Defense Orchestrator (CDO) is a cloud-based, multi-device manager that manages security products like Adaptive Security Appliance (ASA), Firepower Threat Defense next-generation firewall, and Meraki devices, to name a few.
We make improvement...
This document presents the ISE data limiting best practices that can dramatically improve the system performance on ISE.
Your deployment may be impacted if the alarms tab on ISE shows High load average, high CPU or high memoy usage alarm...