Re: CISCO VPN CONCENTRATOR, USE BEHIND A FIREWALL?

2001-10-16 Thread Brian Ford
Ivan, You are correct in that the VPN3015 does not currently have a stateful firewall. It does support access control lists. At this time there is no way to get through a VPN30xx concentrator other than using one of the VPN clients. To date there have been no compromises of that platform.

Re: CISCO VPN CONCENTRATOR, USE BEHIND A FIREWALL?

2001-10-16 Thread bob bobing
Or if you have the enough nics free put both vpn nics behind the firewall. exmple (firewall has 4 nics) outside, inside, dmz1 and dmz2. hope the diagram comes out ok. outside |/ Outside vpn nic. (dmz1) firewall |\ Inside vpn nic. (dmz2) inside This way you can keep state of all

Re: CISCO VPN CONCENTRATOR, USE BEHIND A FIREWALL?

2001-10-16 Thread Brian Ford
Bob, You could do this but if you did you would have to configure the firewall outside interface to pass VPN traffic. If you configure the firewall to pass VPN traffic you lose the capability of using that outside firewall interface to terminate site to site VPN connections. I like leaving

Re: CISCO VPN CONCENTRATOR, USE BEHIND A FIREWALL?

2001-10-16 Thread bob bobing
You could do this but if you did you would have to configure the firewall outside interface to pass VPN traffic. yes, and no. yes i am passing vpn traffic, but its not bound for the outside ip of the firewall, its bound for the static NAT rule, which xlats the external to the outside ip of

RE: CISCO VPN CONCENTRATOR, USE BEHIND A FIREWALL?

2001-10-16 Thread Ben Nagy
G'day, I don't like the solution that loops the VPN traffic through the firewall twice. I can't see any real security gain, and there is a big complexity loss. If you were to use NAT, as bob suggested, then it's even worse, because you have all the VPN / NAT issues. Yes, the Cisco concentrators

RE: CISCO VPN CONCENTRATOR, USE BEHIND A FIREWALL?

2001-10-16 Thread bob bobing
Well i like the fact that you still only have one access point, the firewall. You don't have to worry about the upstream router having a correct access-list. (deny anything, but ipsec traffic to and from the vpn). I can see where this goes totaly against K.I.S.S. but i still really like it.