Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations Mike Lewis on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

Help Needed - Cisco ASA 5510 to PIX506E VPN

Status
Not open for further replies.

eMailDude

MIS
Oct 26, 2009
12
US
Hi, I am a Active Directory / eMail / server guy who's inherited a rather complex Cisco infrastructure to manage (other guy left, they won't replace him) and I have a question about site-to-site VPN.

We have 3 offices, the main office has a Cisco ASA 5510 running version 8 and two smaller offices with PIX 506E version 6. My boss wants me to do a site-to-site VPN between the 3 locations, with HQ as the hub. The 2 remote offices have the outside interface of the PIX connected directly to the Cisco router that AT&T provided and manages, however the HQ office has a FatPipe Warp between the Cisco router and the ASA. The FatPipe is doing NAT for 3 different internet circuits and the IP address between the FatPipe and the ASA is a 172.16 address, so effectively I'm going to be double-natting (I've been researching).

I believe I am going to need the NAT transparency option enabled in the ASA, based on the docs from Cisco.

I've located all the Cisco documentation on performing a site to site VPN between PIX and ASA, but all the documentation assumes the firewall outside interface connects directly to the public side.

My question is this (and I am sure I might have others):

When I configure the VPN connection from a remote office it is asking for the public IP on the other end. I assume I need to assign a public IP in the FatPipe and map it to an internal IP (172 address), should I be mapping that public IP to the ASA outside interface?

internet --- fatpipe (lan 172.16.0.1) --- asa ( outside 172.16.0.250 : inside 192.168.0.250) --- inside network

thanks in advance for any help you can provide.

Jim
 
Your on the right track. If the ASA is the only item behind your FP then you could NAT (one of) the external interface of the FP to your ASA so that all packets comming into that IP would be routed through the ASA. In fact I would think that that would be the case for all of the interfaces on the FP unless you had multiple ASA devices handling multiple networks and/or protocols (http vs. ftp, smtp).
 
Status
Not open for further replies.

Part and Inventory Search

Sponsor

Back
Top