Hi there,
Starting to plan a new remote office and thought I would put this out there to see what others may think.
Central office currently using PIX 515E for VPN, clients authenticating via vpn group only, right now. No current site-to-site configuration.
Central office will migrate to 4th interface on PIX with dedicated dsl exclusive to VPN traffic. Plan on utilizing VPN3000 concentrator with W2K3 IAS server running Radius. Question:Would you put concentrator outside of firewall or inside firewall? Configuration examples greatly appreciated. Or should Concentrator stand on it's own and not be connected to firewall at all and still have direct access to radius server on internal network? Concentrator will have to terminate site-to-site and individual clients with radius for domain authentication. Will eventually implement authorization and accounting on radius as well.
Remote officeurchase another PIX515E, 3 interfaces. Use 3rd interface(normally dmz) for dedicated site-site vpn (no requirement for dmz at remote location), use outside interface for internet traffic. 2 dedicated dsl's, one for vpn to head office one for internet. Remote office will be part of domain and have additonal domain controller at location. Users must be able to access domain at all times and mail server, file servers located at head office. Internet traffic should default to outside interface. Will put cisco 3550 EMI switch behind firewall to do routing and cisco 2950 switch for desktop connectivity. 20-30 users in office. Configuration examples greatly appreciated.
What do you think? Is this design feasable and scalable? As this is only in the planning stages I am open to any and all suggestions for improvement or alternative designs.
Thanks in advance,
Loyalist
Starting to plan a new remote office and thought I would put this out there to see what others may think.
Central office currently using PIX 515E for VPN, clients authenticating via vpn group only, right now. No current site-to-site configuration.
Central office will migrate to 4th interface on PIX with dedicated dsl exclusive to VPN traffic. Plan on utilizing VPN3000 concentrator with W2K3 IAS server running Radius. Question:Would you put concentrator outside of firewall or inside firewall? Configuration examples greatly appreciated. Or should Concentrator stand on it's own and not be connected to firewall at all and still have direct access to radius server on internal network? Concentrator will have to terminate site-to-site and individual clients with radius for domain authentication. Will eventually implement authorization and accounting on radius as well.
Remote officeurchase another PIX515E, 3 interfaces. Use 3rd interface(normally dmz) for dedicated site-site vpn (no requirement for dmz at remote location), use outside interface for internet traffic. 2 dedicated dsl's, one for vpn to head office one for internet. Remote office will be part of domain and have additonal domain controller at location. Users must be able to access domain at all times and mail server, file servers located at head office. Internet traffic should default to outside interface. Will put cisco 3550 EMI switch behind firewall to do routing and cisco 2950 switch for desktop connectivity. 20-30 users in office. Configuration examples greatly appreciated.
What do you think? Is this design feasable and scalable? As this is only in the planning stages I am open to any and all suggestions for improvement or alternative designs.
Thanks in advance,
Loyalist