I have the following scenario:
- One external netscreen firewall that is connected directly to the internet
- One internal firewall that further protects some internal subnets
Internet <--- External Firewall ---> DMZ <--- Internal Firewall ---> Internal subnets
Only the external firewall has a public ip-adress.
What is the best approach for a IPsec VPN connection to the internal subnet? I know how to get a functional vpn connection to the external firewall, but how do I proceed from there? When the connection is up, the user should be able to reach the internal subnet. I get a bit lost when it comes to vpns that goes through more than one FW. How do I allow access to other network segments than the ones that is directly attached to the vpn firewall?
Any hints/tips/ideas on how to proceed?
- One external netscreen firewall that is connected directly to the internet
- One internal firewall that further protects some internal subnets
Internet <--- External Firewall ---> DMZ <--- Internal Firewall ---> Internal subnets
Only the external firewall has a public ip-adress.
What is the best approach for a IPsec VPN connection to the internal subnet? I know how to get a functional vpn connection to the external firewall, but how do I proceed from there? When the connection is up, the user should be able to reach the internal subnet. I get a bit lost when it comes to vpns that goes through more than one FW. How do I allow access to other network segments than the ones that is directly attached to the vpn firewall?
Any hints/tips/ideas on how to proceed?