Hello All,


We are going to set up a secure environment to access external routers 
(located in a specfic DMZ) for management purposes.
The initial idea was having a dedicated Nokia IP440 connecting to the 
various routers via an IPSEC tunnel. That firewall itself is with one leg 
in the management  LAN, and the other leg in a firewall LAN connection the 
various DMZ.
So basically, the firewall would be the endpoint of all IPSEC tunnels to 
the routers to be managed.

Being a Cisco-oriented person, I don't really like this solution as it will 
be harder for me to manage the IPSEC sided on the firewall, esp when more 
tunnels have to be added or removed.
This is why I thought of the following alternative, and it is for that one 
that I would like your opinion.

My suggestion is to put a dedicated IPSEC VPN router between the firewall 
and the routers to be managed. The firewall would then have only -one- 
IPSEC tunnel towards the dedicated router, and that dedicated router would 
then be the endpoint of all IPSEC tunnels to the other cisco routers to be 
managed.

I hope I described the setup in an understandable way.

I would appreciate any comments on this, esp. if someone had already 
experience with it.

Thanks,

    ...Giorgo


_______________________________________________
Firewalls mailing list
[EMAIL PROTECTED]
http://lists.gnac.net/mailman/listinfo/firewalls

Reply via email to