You have no DHCPD addresses!
It should look like this:
dhcpd address 192.168.1.2-192.168.1.254 inside
dhcpd dns 12.127.16.67 12.127.17.72
dhcpd wins x.x.x.x x.x.x.x
dhcpd lease 3600
dhcpd ping_timeout 750
dhcpd domain xxxx.com
dhcpd enable inside
This should help you.
Mike
Best way to do this is a client VPN connection through the PIX into the trusted network then w/remote desktop you can access it. Or do a static one for one translation & open yourself up to the world. VPN is the way to go.
Mike
First off keep it simple! Kill the names until it's working.
2nd you have an outside ip 99.99.99.99 255.255.255.240
w/a route outside of 62.206.41.65, can you even ping the default route. Ping outside 62.206.41.65 do you get a reply?
Kill these 2 transform sets,
crypto ipsec transform-set...
Well you have to create ACLs for this. For example if you have internal net. 192.168.1.0/24 & the DMZ is 172.168.4.0/24 the ACLs go source then destination.
Example: access-list in2dmz permit ip 192.168.1.0 255.255.255.0 172.168.4.0 255.255.255.0
Then: access-group in2dmz in interface dmz
This...
Yes, UDP/500 is part of the crypto process, but if you are passing through a PIX from something like a client, If this is the case then you need UDP/500 protocol 50 & 51 AH & ESP opened to pass client through. If you are trying to just L2L crypto tunnel up that's different. What version are you...
Trying to setup sonics back to back, sonic 1 being a scrub house for all traffic, monitoring etc. then forward all traffic vpn etc. to the firewall for normal delivery.
Need some advice on how to do this.
What I'm trying to do is build a safe zone for all traffic to pass through for content filter monitor & traffic monitor, also have a mail scrubber in the safe zone. Then forward all traffic vpn & otherwise through to the firewall ( a second sonic ) for normal translation into the trusted zone...
It sounds to me like you have the same user doing wireless & connecting to the LAN wired, if this is the case then what you have now is a bridged loop in the network & that can storm your network to a crawl, just like a DOS attack.
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.