Hi Chandler,
To secure the laptop of company a while connected via VPN form company B my
suggestion is to run the Client Firewall feature the concentrator has, (this
is why I love this device so much). While you are connected via VPN, the
concentrator will inject a set of rules, (a firewall
John,
One question at the time:
1) I noticed that I never set an isakmp pre-share key
- Remember that for a VPN client connection, ISAKMP or Phase I is
established using aggressive mode in this case and due the remote
connection would come from any place on the Internet; a pre-share
Hi James,
It would be nice to have the output of the show crypto ipsec sa on the PIX
while pinging back and forth. It would be nice to get the output of the
debug icmp trace and the sh access-list as well but in any case my
suggestion is this:
1) If you are doing split-tunneling I will
3 matches
Mail list logo