Hi Keith,
 
We have a Hipath phone system here and we had a similar issue getting a SIRA 
tunnel established from Siemens to our XSR. Couldn't get it to work despite 
repeated tries with both Siemens support and GTAC involved. I wound up using a 
Linksys/Cisco RVL200 (which I had sitting around from another project) as the 
tunnel endpoint here. It's a pretty simple little device. It has a WAN port and 
4 LAN ports. What  I did was assign the WAN port a fixed Internet IP address 
(with the appropriate firewall rules and filters to pass IPSEC on through the 
XSR, of course). I gave the internal interface an IP address in our phone 
management vlan range and connected it to a switch port which egresses the 
phone vlan untagged. Then all I had to do was add a static route on our core 
router so that the SIRA ip traffic would route back to Siemens via the Linksys, 
and not the default gateway out to the internet. The tunnel seems to be stable 
and our Siemens tech is happy that he doesn't have to use the dialup line to 
fix problems anymore. Hope that helps. 
 
Bill


 
 
Bill Reed
Telecommunications and Network Administrator
Franciscan University of Steubenville
740-284-5199 >>> 


From: Keith Jefferson <[email protected]>
To:"Enterasys Customer Mailing List" <[email protected]>
Date: 3/9/2011 5:10 PM
Subject: [enterasys] SIRA VPN Access
This may not be the right place to ask this question, but the thought
here is that since Siemens recommends Enterasys POE switches in their
configurations, that someone has encountered a similar situation.

I have actually a rather complex network comprising 4 subnets with a
nice mix of Unix, Mac and Windows packets flying about in addition to
the voice traffic created by a new Siemens HiPath 4000 Phone System.
But for simplicity, what I actually need help on can be summarized in
this diagram:

+--------------+     +--------+     +--------------------+
|              |     |        |     |   192.168.97.203   |
| Workstations +-----+ Phones +-----+ B5 Stack (VLAN 97) |
|              |     |        |     |--------------------|          
+--------------+     +--------+     | B5 Stack (VLAN 72) |
  192.168.97.x       172.16.1.x     |    172.16.1.1      |
                                    +---------+----------+    
                                              |
                                              |
                                              |
             +----------+----------+----------+
             |          |          |
             |          |          |
             |          |          |
          +--+--+    +--+--+    +--+--+
          |     |    |     |    |     |
          |     |    |     |    |     |
          +-----+    +-----+    +-----+
          Voice      HiPath 4K  Call Center  
          Recorder              Server

We have an Enterasys B5 Stack that basically is the center of the
network.  The phones are on a 172.16.1.x subnet and are all connected
directly to the stack.  Each user workstation is connected to the back
of the phone, on a separate 192.168.97.x subnet.  The majority of the
stack, including the phones, is configured in one VLAN (VLAN 97), with a
few ports reserved for the actual Siemens equipment in a separate VLAN
(VLAN 72).  Everything uses the B5 as its gateway, either the
192.168.97.203 address for the workstations, or 172.16.1.1 for the
phones and phone equipment.  This allows the workstations to see the
phone equipment for Call Center reports, etc. even though they are on
separate VLANs.

All of this was setup by the Enterasys folks when the phone system was
installed, and it all works great.

One wrinkle not shown here that I added after the fact: There is a
Watchguard router connected to VLAN 97 with an address of 192.168.1.1.
VLAN 97 has a secondary address of 192.168.1.203 and a static route to
the Watchguard.  The Watchguard has a corresponding static route to
172.16.1.0 using the 192.168.1.203 address as a gateway.  This grants
internet access to the equipment connected to VLAN 72, WITHOUT giving
internet access to the user workstations connected to VLAN 97.  This is
a customer requirement. 

Siemens needs IPSec VPN access to all of the equipment on VLAN 72, as
their SIRA support system relies on it.  For whatever reason, their
system refuses to talk to the Watchguard (which hosts several other VPN
tunnels), we've been down that road.  So I need to introduce a new VPN
router specifically for their use.  And this is where I get confused.

My first thought was to disconnect the Watchguard from the stack (it
served no other purpose to the phone system beyond granting the
aforementioned internet access) and connect another VPN device in it's
place.  I figure it can take care of the internet access also, and that
one router in this piece of the network is plenty.  That's why I didn't
show it above.

So my first attempt was to change the IP address of VLAN 72 on the B5
stack to 172.16.1.2, and introduce the VPN router at 172.16.1.1,
connected to VLAN 97 as the Watchguard was.  This way, all of the VLAN
72 devices now use the VPN router as a gateway, so the router can grant
IPSec VPN access to them, and those devices also get their required
internet access, while the VLAN 97 workstations do not.

However, doing this (changing the gateway, I imagine) caused the VLAN 97
workstations to lose access to the VLAN 72 equipment.  From a
workstation I could ping the B5 stack at 172.16.1.2, but I could not
reach the router (172.16.1.1) or more importantly the Call Center Server
(172.16.1.19) which is used to constantly display a Calls in Queue
monitor among other things.

And my sophmoric attempt to resolve the situation by adding a static
route on the B5 to a network to which it was already directly connected:

ip route 172.16.1.0 255.255.255.0 172.16.1.1

did not solve that problem <G>.  So at that point, I decided that I
clearly didn't know what I was doing and restored the status quo.  All
of this is taking place at a fairly large organization and I only have
the liberty to play around with the configuration on weekends.  My
strategy now is to try to figure out on paper what's going to work, and
return on a weekend with a new plan of attack.

So I'm hoping that there is someone else out there with a Siemens phone
system and their recommended Enterasys switch stack, who also has their
workstations piggy backed out of their phones, that has successfully
granted Siemens their required SIRA access.  If so, what type of router
did you use and how is it connected to your network with respect to the
switch stack?  Even if you don't have my added wrinkle of selective net
access, it might give me the insight I need to finish this off.

Thanks,

--Keith Jefferson 
  Iscomp Systems



  


---
To unsubscribe from enterasys, send email to [email protected] with the body: 
unsubscribe enterasys [email protected]


Scanned by for virus, malware and spam by SCM appliance

---
To unsubscribe from enterasys, send email to [email protected] with the body: 
unsubscribe enterasys [email protected]

Reply via email to