I now understand. Thanks you very much to all.
One last question:
How to build VPN Site-to-Site between 2 small networks with PIX Firewall 501 and PIX Firewall 506E ?
I read and try this help:
but PIX no connect over VPN. Where is my mistake ?
PIX 501:
interface ethernet0 auto
interface ethernet1 auto
ip address outside 212.39.65.5 255.255.255.0
ip address inside 10.10.1.0 255.255.255.0
hostname PIX501
isakmp enable outside
isakmp policy 1 authentication pre-share
isakmp policy 1 encryption des
isakmp policy 1 hash md5
isakmp policy 1 group 1
isakmp policy 1 lifetime 1000
isakmp key 1234 address 212.39.65.211 netmask 255.255.255.255
access-list 101 permit ip 10.10.1.0 255.255.255.0 10.10.2.0 255.255.255.0
crypto ipsec transform-set chevelle esp-des esp-md5-hmac
crypto map transam 1 ipsec-isakmp
crypto map transam 1 match address 101
crypto map transam 1 set peer 212.39.65.211
crypto map transam 1 set transform-set chevelle
crypto map transam interface outside
nat (inside) 0 access-list 101
sysopt connection permit-ipsec
PIX 506E:
interface ethernet0 auto
interface ethernet1 auto
ip address outside 212.39.65.211 255.255.255.0
ip address inside 10.10.2.0 255.255.255.0
hostname PIX501
isakmp enable outside
isakmp policy 1 authentication pre-share
isakmp policy 1 encryption des
isakmp policy 1 hash md5
isakmp policy 1 group 1
isakmp policy 1 lifetime 1000
isakmp key 1234 address 212.39.65.5 netmask 255.255.255.255
access-list 101 permit ip 10.10.2.0 255.255.255.0 10.10.1.0 255.255.255.0
crypto ipsec transform-set toyota esp-des esp-md5-hmac
crypto map bmw 1 ipsec-isakmp
crypto map bmw 1 match address 101
crypto map bmw 1 set peer 212.39.65.5
crypto map bmw 1 set transform-set chevelle
crypto map bmw interface outside
nat (inside) 0 access-list 101
sysopt connection permit-ipsec
Thanks again.