Yes,

He should use public on the outside link and then private on the inside
the setup would be much easier that way. NAT or PAT on a pix is so easy.

And I had a slight brain fart he can't use private on the outside. The
reason being because of the peer addressing that has to go on the pix
for the vpn tunnel. So of course if he used private there is no way site
A can talk to site B across the internet.

-----Original Message-----
From: Priscilla Oppenheimer [mailto:[EMAIL PROTECTED]] 
Sent: Monday, November 18, 2002 10:27 PM
To: [EMAIL PROTECTED]
Subject: RE: PIX site-to-site VPN question... [7:57648]


Elijah Savage III wrote:
> 
> Oh yeah with the limited address space the correct term I meant to use
> is PAT not to confuse anyone. The outside interface on the pix
> has 1
> public and everyone gets NAT's to that one global address.

So, use public addressing on the PIX(outside)-router link. In the
previous message you said he could use either, but it will make things
easier if he uses public on that link and private on the

-------(inside)PIX link, eh?

Sorry, if I'm being dim-witted. :-)

Priscilla


> 
> -----Original Message-----
> From: Priscilla Oppenheimer [mailto:[EMAIL PROTECTED]]
> Sent: Monday, November 18, 2002 9:27 PM
> To: [EMAIL PROTECTED]
> Subject: RE: PIX site-to-site VPN question... [7:57648]
> 
> 
> Brunner Joseph wrote:
> > 
> > You should use private addressing behind the pix and use
> static's from
> 
> > the /29 to map to Servers, etc. behind the pix.
> > 
> > Why would you ever want to put public ip's behind a pix ?
> especially
> > for a vpn ? Not cool. It makes it an easier target to spoof,
> as
> > apposed to RFC1918 addresses.
> 
> I don't think he was suggesting using public IP addresses behind the
> PIX. What addressing would you recommend for the LAN between
> the outside
> interface of the PIX and the router, per this part of his
> drawing:
> 
> PIX1(outside)----(e0)R1(e1)--------INTERNET
> 
> 
> By the way, he really did show R1 having an Ethernet interface out to
> the Internet. I don't think it was a typo. In the case that
> came up last
> week, this Ethernet than went to a wireless WAN of some sort.
> 
> Could you take another look at the question and give us some advice?
> This question came up last week too and the person never got a
> good
> answer. I would answer it myself but I'm PIX and VPN challenged
> (but
> learning! ;-)
> 
> Priscilla
> 
> 
> > 
> > Answering your original qwestion -
> > 
> > "If I'm provided a /29 address by my ISP for PIX1's site,
> then how
> > does the PIX1's outside and R1's ethernet addresses get
> provisioned
> > (same question for PIX2's site)?"
> > 
> > If you insist on using public's behind your pix, you get a
> /29 for
> > behind, and 2 /30's. One for Pix to RTR and one for RTR to
> ISP EDGE.
> > 
> > The routers also should NEVER use UNNUMBERED !  How do you
> remote
> > manage the router if the Ethernet line proto is down ?
> Loopback ?
> > You wont have a public IP if your ISP skimps on Addresses.. I have 
> > seem some whack configs where s0/0 is unnumbered, and the only
> > routed block is on e0/0. Its not worth saving the /30 for
> added
> > aggrevation.
> > 
> > "Are they bridged or unnumbered in some way?" the routers
> know nothing
> 
> > of your Site to Site VPN. They just route.. nuff said on that.
> > 
> > 
> > "How do the
> > PIX's use private addresses as for their crypto peer statements?"
> > 
> > They can't. Not unless you use "outside" nat on the rtr's
> something I
> > don't think you can or want to do.. Just use Publics all
> around for
> > your crypto peer statements.. I dont think you can do it
> anyother
> > way.. one creative way to do it, maybe, run a
> > 
> > GRE tunnel from router to router (say 10.0.1.0/24). Use 2
> more /24
> > private class C's for in between router and pix on each side.
> > 
> > Just route everthing (which is also encrypted) thru the
> tunnel.
> > have "NO NAT" on your pixes for internal stuff to go out of router 
> > on S0/0 (instead of "VPN" traffic which goes out TUNNEL0). this 
> > should make your PIX's harder to attack, and if you want you can run

> > nat on the router for hosts, or have another nat proxy behind pix 
> > (either way, pix wont do nat,
> with
> > this "low-profile" config trick.




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=57665&t=57648
--------------------------------------------------
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

Reply via email to