Several VPN strategies to even peer. Is is possible?

I am trying to create several strategies of VPN for the peer even on a TZ 105.  The peer is an another SonicWall.   Whenever I have create the second strategy the peer starts sending invalid ID back messages in IKE1 negotiations.

The two policies are using sources different subnets and subnets of different destination.  A source subnet is connected to the X 0 port and the other to port X 2.   The basic idea is for devices on the subnet connected to the X 0 port to reach a limited number of private behind the SonicWall remote subnets.  Devices connect to port X 2 should tunnel all public internet traffic over the VPN and access the internet through the SonicWall remote.   There are complicated reasons behind this desired configuration.

I am new to SonicWall, so I don't know if it is still possible to what I'm trying to do.  If this is the case, I am clearly something wrong.  I'll fill in more details if necessary.

No you can't do that. You must create 1 policy that contains all the networks you want to allow to browse this VPN.

Thank you
Ben D
Reference Dell SonicWall
#iwork4Dell

Tags: Dell Tech

Similar Questions

  • Counters of ACL for group VPN indicates zero even if there are traffic

    Hi all

    I use a PIX 515E. I defined a remote user VPN, its pool of addresses and also set several ACLs that apply to traffic originating from this address pool of servers on the inside network.

    Does anyone have ideas why the ACL hitcounts remain at zero, even if my remote users always access the servers?

    Thanks for the wisdom!

    Joe

    Joe,

    Your probably using the command "sysopt connection permit-ipsec.

    As quoted in the PIX guide on cisco.com:

    "Use the sysopt connection permit-ipsec command in IPSec configurations to allow IPSec traffic to pass through the PIX firewall without a verification of statements of led command or access-list"

    The list located on the external interface is bypassed by this feature.

  • Multiple IPSec Tunnels, even peer

    Hi all

    I need to know if it's possible with Cisco technology to create several PKI IPsec tunnels with the same peer and the same subnet of destination in phase2.

    Thank you

    Brigitta

    The server reports that, or the firewall?

    If this is the firewall, make sure that you have a nat rule saying not NAT traffic firewall 'interesting' via the VPN.

  • Several VPN site to site on the same ASA

    I need to set up an IPSEC tunnel to allow a provider to the remote site printing to a printer on my network.  I intend to use an ASA 5520 to do this.  The architecture is fairly simple:

    [Remote]-[Remote FW] --[FW Local]-[Local routing]-[printer]

    The downside is that there is finally more than a seller who needs to do.  Each will have a different destination but mena there will be more than a VPN to ASA at my end.  It seems that the ASA 5520 can be supported more than a VPN site to site, but I need to assign an IP address for different endpoint in each tunnel?

    I searched and found no a design guide for the VPN site - to-many.  If so, I'd appreciate a pointer.

    --

    Stephen

    You can do several tunnels VPN site to site.  As a general rule, you would have a card encryption applied to the interface in the face of internet.  Each crypto map entry has a sequence number. You simply have to create all the necessary configurations (tunnel-group for the remote peer IP, ACL to set interesting traffic, etc.) and increment the entry card crypto.

     Example: crypto map outside_map 1 match address s2s-VPN-1 crypto map outside_map 1 set pfs crypto map outside_map 1 set peer 1.2.3.4 crypto map outside_map 1 set transform-set ESP-3DES-SHA tunnel-group 1.2.3.4 type ipsec-l2l tunnel-group 1.2.3.4 ipsec-attributes  ikev1 pre-shared-key SomeSecureKey$ crypto map outside_map 2 match address s2s-VPN-2 crypto map outside_map 2 set pfs crypto map outside_map 2 set peer 4.5.6.7 crypto map outside_map 2 set transform-set ESP-3DES-SHA tunnel-group 4.5.6.7 type ipsec-l2l tunnel-group 4.5.6.7 ipsec-attributes ikev1 pre-shared-key SomeSecureKey2$

  • VPN 3000 and wildcard peer IKE

    The order PIX (http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/pix_sw/v_63/cmdref/gl.htm#wp1027312) reference:

    ISAKMP key address

    To configure a preshared authentication key and associate the key with a host name or the IPSec peer address, use the address isakmp key command. Use the address no. isakmp key command to remove a preshared authentication key and its associated IPSec peer address.

    A 0.0.0.0 netmask. may be entered as a wildcard indicating that any peer IPSec with a preshared key valid given is a valid counterpart.

    Question: Is it possible to do the same thing on the VPN 3000? I have a bunch of PIX firewall, they use DSL w / DHCP. I need them to operate in the Mode of Extension of network, but unlike PIX, I can't seem to get the VPN 3000 to accept the '0.0.0.0' as you can do it with PIX. Anyone has any idea if this is possible or another way to achieve the goal? Any ideas would be greatly appreciated.

    Yep, it's possible, even if it's not too obvious how you do :-) The following configuration example shows how do:

    http://www.Cisco.com/en/us/products/HW/vpndevc/ps2284/products_configuration_example09186a00801dd672.shtml

    The key option is the "Default pre-shared key" under the core group.

  • Several VPN GET with Multicast clouds

    Hi all

    It is a recommended approach to use different multicast addresses if you use a key server to manage several groups GET VPN? It is not a provider environment hosted service but just for one customer in need of a logical separation.

    I think it would be a good idea to do it, but I'm not very familiar with multicasting on a set, so I would appreciate anyone sharing similar experiences or the potential pitfalls with this config. Is there something I need to watch out for?

    Xavier

    Xavier,

    given that we can separate the information at the level of the GDOI groups you should not need to use multiple addresses.

    However consider a scenario in which a GM is part of Group 1, but not in Group 2. He will receive discount at the key for both, but will not be able to understand group2 generate a new key, you will see the log messages that signals a problem once per hour.

    It makes sense to separate the addresses mcast especially if this deployment could grow/fork/expand in the future.

    M.

  • Several VPN first L2L works, still acting strangely

    Hello

    I use a Cisco 1921. I created 3 VPN L2L. Although I can get all 3 upward tunnel, I can in the case of a ping the LAN IP of the router and the 2nd on since the subnet of peers, but not vice versa. If anyone can make sense of what would be great... I can see the ACL being fired,

    Annoying as the first VPN is in place and working well, in both directions... Would really appreciate a new pair of eyes...

    NAT, blocking ACL works fine too...

    Glasgow #show access lists

    Expand the access IP 101 list

    10 permit ip 172.16.20.0 0.0.0.255 192.168.0.0 0.0.0.255 (966 matches)

    Extend the 104 IP access list

    10 permit ip 172.16.20.0 0.0.0.255 192.168.3.0 0.0.0.255 (3606 matches)

    Extend the 105 IP access list

    10 permit ip 172.16.20.0 0.0.0.255 192.168.100.0 0.0.0.255 (3609 matches)

    Extend 175 IP access list

    10 deny ip 172.16.20.0 0.0.0.255 192.168.0.0 0.0.0.255 (2109 matches)

    20 deny ip 172.16.20.0 0.0.0.255 192.168.3.0 0.0.0.255 (3616 matches)

    30 deny ip 172.16.20.0 0.0.0.255 192.168.100.0 0.0.0.255 (3639 matches)

    IP 172.16.20.0 allow 40 0.0.0.255 everything (1549 matches)

    Here's the (sanitized) snippits sorry I hate so lazy reading peoples config dumps...

    crypto ISAKMP policy 1

    BA 3des

    preshared authentication

    Group 2

    ISAKMP crypto key demopassword address 146.xx.xx.xx

    ISAKMP crypto key demopassword address 212.xx.xx.xx

    ISAKMP crypto key demopassword address 188.xx.xx.xx

    !

    !

    Crypto ipsec transform-set esp-3des-sha1 esp-3des esp-sha-hmac

    !

    l2l 99 ipsec-isakmp crypto map

    the value of 188.xx.xx.xx peer

    the transform-set esp-3des-sha1 value

    match address 101

    l2l 100 ipsec-isakmp crypto map

    the value of 212.xx.xx.xx peer

    the transform-set esp-3des-sha1 value

    match address 105

    l2l ipsec 101-isakmp crypto map

    the value of 146.xx.xx.xx peer

    the transform-set esp-3des-sha1 value

    match address 104

    !

    interface GigabitEthernet0/1

    WAN description

    IP address 213.xx.xx.xx 255.255.255.xx

    NAT outside IP

    IP virtual-reassembly in

    automatic duplex

    automatic speed

    L2L card crypto

    !

    overload of IP nat inside source list 175 interface GigabitEthernet0/1

    !

    access-list 101 permit ip 172.16.20.0 0.0.0.255 192.168.0.0 0.0.0.255

    access-list 104. allow ip 172.16.20.0 0.0.0.255 192.168.3.0 0.0.0.255

    access-list 105 allow ip 172.16.20.0 0.0.0.255 192.168.100.0 0.0.0.255

    access-list 175 deny ip 172.16.20.0 0.0.0.255 192.168.0.0 0.0.0.255

    access-list 175 deny ip 172.16.20.0 0.0.0.255 192.168.3.0 0.0.0.255

    access-list 175 deny ip 172.16.20.0 0.0.0.255 192.168.100.0 0.0.0.255

    access-list 175 allow ip 172.16.20.0 0.0.0.255 any

    For the second tunnel (192.168.100.0/24), as you can see from the output, it program, but no decaps counter which means, traffic is sent to the remote end, however, nothing's coming back. So it could have been blocked at the remote end since your first tunnel works very well, I guess nothing is blocking it on your side.

  • ASA 5505 - several VPN subnet

    I'm trying to set up a VPN for use with the Cisco VPN Client.  I currently have operational VPN, but I cannot allow access to several subnets connected to the ASA.  My current stock of VPN DHCP is 10.0.0.0/24.  I want to VPN users to talk to one of my other VLAN (172.16.20.0/24).  That's what I can't understand.  If I change my VPN DHCP pool to something like 172.16.20.100 - 110 can I talk to about everything on this fine subnet.  But as soon as I change the DHCP pool to the other subnet so I can't.  Any suggestions?

    Here is my config:

    Nysyr-SBO-ASA (config) # sh run

    : Saved

    :

    ASA Version 8.4 (1)

    !

    names of

    !

    interface Vlan1

    No nameif

    no level of security

    no ip address

    !

    interface Vlan2

    Description connection to the ISP (FiOS)

    nameif primaryisp

    security-level 0

    IP address

    !

    interface Vlan3

    Description secondary connection ISP (Time Warner)

    nameif backupisp

    security-level 0

    IP address

    !

    interface Vlan5

    Description Connection to the subnet internal internet access (192.168.5.0/24)

    nameif inside

    security-level 100

    192.168.5.1 IP address 255.255.255.0

    !

    interface Vlan20

    Description Connection to the internal management network (172.16.20.0/24)

    nameif insidemgmt

    security-level 100

    address 172.16.20.1 IP 255.255.255.0

    !

    interface Ethernet0/0

    switchport access vlan 2

    !

    interface Ethernet0/1

    switchport access vlan 3

    !

    interface Ethernet0/2

    switchport access vlan 5

    !

    interface Ethernet0/3

    switchport access vlan 20

    !

    interface Ethernet0/4

    Shutdown

    !

    interface Ethernet0/5

    Shutdown

    !

    interface Ethernet0/6

    Shutdown

    !

    interface Ethernet0/7

    Shutdown

    !

    passive FTP mode

    clock timezone IS - 5

    clock to summer time EDT recurring

    internal network object

    192.168.5.0 subnet 255.255.255.0

    network of the object asp-wss-1-tw

    Home 192.168.5.11

    network of the object asp-wss-1-vz

    Home 192.168.5.11

    network vpn-ip-pool of objects

    10.0.0.0 subnet 255.255.255.0

    access-list outside_access_in_1 note access list to allow outside in traffic

    outside_access_in_1 list extended access permit tcp any object asp-wss-1-vz eq www

    outside_access_in_1 list extended access permit tcp any object asp-wss-1-vz eq https

    outside_access_in_1 list extended access permit tcp any object asp-wss-1-tw eq www

    outside_access_in_1 list extended access permit tcp any object asp-wss-1-tw eq https

    SBOnet_VPN_Tunnel_splitTunnelAcl standard access list allow 172.16.20.0 255.255.255.0

    pager lines 24

    Enable logging

    asdm of logging of information

    primaryisp MTU 1500

    backupisp MTU 1500

    Within 1500 MTU

    insidemgmt MTU 1500

    vpn-ip-pool 10.0.0.10 mask - 255.255.255.0 IP local pool 10.0.0.250

    no failover

    ICMP unreachable rate-limit 1 burst-size 1

    don't allow no asdm history

    ARP timeout 14400

    NAT (inside primaryisp) source Dynamics one interface

    NAT (inside backupisp) source Dynamics one interface

    !

    network of the object asp-wss-1-tw

    NAT (inside backupisp) static

    network of the object asp-wss-1-vz

    NAT (inside primaryisp) static

    Access-group outside_access_in_1 in the primaryisp interface

    Access-group outside_access_in_1 in the backupisp interface

    Route 0.0.0.0 primaryisp 0.0.0.0 1 track 1

    Route 0.0.0.0 backupisp 0.0.0.0 10

    Timeout xlate 03:00

    Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02

    Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00

    Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00

    Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute

    timeout tcp-proxy-reassembly 0:01:00

    dynamic-access-policy-registration DfltAccessPolicy

    the ssh LOCAL console AAA authentication

    Enable http server

    http 192.168.5.0 255.255.255.0 inside

    http 0.0.0.0 0.0.0.0 primaryisp

    http 0.0.0.0 0.0.0.0 backupisp

    http 0.0.0.0 0.0.0.0 insidemgmt

    No snmp server location

    No snmp Server contact

    Server enable SNMP traps snmp authentication linkup, linkdown warmstart of cold start

    monitor SLA 123

    type echo protocol ipIcmpEcho 8.8.8.8 interface primaryisp

    threshold of 3000

    frequency 10

    Annex ALS life monitor 123 to always start-time now

    Crypto ipsec transform-set ikev1 ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac

    Crypto ipsec transform-set ikev1 ESP-DES-SHA esp - esp-sha-hmac

    Crypto ipsec transform-set ikev1 esp ESP-DES-MD5-esp-md5-hmac

    Crypto ipsec transform-set ikev1 ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac

    Crypto ipsec transform-set ikev1 ESP-3DES-MD5-esp-3des esp-md5-hmac

    Crypto ipsec transform-set ikev1 ESP-AES-256-SHA esp-aes-256 esp-sha-hmac

    Crypto ipsec transform-set ikev1 ESP-AES-128-SHA aes - esp esp-sha-hmac

    Crypto ipsec transform-set ikev1 ESP-AES-192-SHA esp-aes-192 esp-sha-hmac

    Crypto ipsec transform-set ikev1 ESP-AES-128-MD5-esp - aes esp-md5-hmac

    Crypto ipsec transform-set ikev1 SHA-ESP-3DES esp-3des esp-sha-hmac

    Dynamic crypto map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set transform-set ESP-AES-256-SHA ikev1

    primaryisp_map card crypto 65535-isakmp dynamic ipsec SYSTEM_DEFAULT_CRYPTO_MAP

    card crypto primaryisp_map interface primaryisp

    backupisp_map card crypto 65535-isakmp dynamic ipsec SYSTEM_DEFAULT_CRYPTO_MAP

    card crypto backupisp_map interface backupisp

    Crypto ca trustpoint ASDM_TrustPoint0

    Terminal registration

    name of the object CN =

    Configure CRL

    IKEv2 crypto policy 1

    aes-256 encryption

    integrity sha

    Group 5

    FRP sha

    second life 86400

    Crypto ikev2 enable primaryisp

    Crypto ikev2 enable backupisp

    Crypto ikev1 enable primaryisp

    Crypto ikev1 enable backupisp

    IKEv1 crypto policy 30

    preshared authentication

    aes-256 encryption

    sha hash

    Group 2

    life 86400

    !

    track 1 rtr 123 accessibility

    Telnet timeout 5

    SSH 0.0.0.0 0.0.0.0 primaryisp

    SSH 0.0.0.0 0.0.0.0 backupisp

    SSH 0.0.0.0 0.0.0.0 insidemgmt

    SSH timeout 20

    Console timeout 20

    No vpn-addr-assign aaa

    No dhcp vpn-addr-assign

    a basic threat threat detection

    statistical threat detection port

    Statistical threat detection Protocol

    Statistics-list of access threat detection

    no statistical threat detection tcp-interception

    WebVPN

    internal SBOnet_VPN_Tunnel group strategy

    attributes of Group Policy SBOnet_VPN_Tunnel

    Ikev1 VPN-tunnel-Protocol

    Split-tunnel-policy tunnelall

    value of Split-tunnel-network-list SBOnet_VPN_Tunnel_splitTunnelAcl

    attributes of Group Policy DfltGrpPolicy

    value of Split-tunnel-network-list SBOnet_VPN_Tunnel_splitTunnelAcl

    attributes global-tunnel-group DefaultRAGroup

    VPN-ip-pool-pool of addresses (primaryisp)

    ip vpn-pool address pool

    IPSec-attributes tunnel-group DefaultRAGroup

    IKEv1 pre-shared-key *.

    type tunnel-group SBOnet_VPN_Tunnel remote access

    attributes global-tunnel-group SBOnet_VPN_Tunnel

    ip vpn-pool address pool

    Group Policy - by default-SBOnet_VPN_Tunnel

    IPSec-attributes tunnel-group SBOnet_VPN_Tunnel

    IKEv1 pre-shared-key *.

    !

    class-map inspection_default

    match default-inspection-traffic

    !

    !

    type of policy-card inspect dns preset_dns_map

    parameters

    maximum message length automatic of customer

    message-length maximum 512

    Policy-map global_policy

    class inspection_default

    inspect the preset_dns_map dns

    inspect the ftp

    inspect h323 h225

    inspect the h323 ras

    Review the ip options

    inspect the netbios

    inspect the rsh

    inspect the rtsp

    inspect the skinny

    inspect esmtp

    inspect sqlnet

    inspect sunrpc

    inspect the tftp

    inspect the sip

    inspect xdmcp

    inspect the icmp

    !

    global service-policy global_policy

    context of prompt hostname

    call-home

    Profile of CiscoTAC-1

    no active account

    http https://tools.cisco.com/its/service/oddce/services/DDCEService destination address

    email address of destination [email protected] / * /

    destination-mode http transport

    Subscribe to alert-group diagnosis

    Subscribe to alert-group environment

    Subscribe to alert-group monthly periodic inventory

    monthly periodicals to subscribe to alert-group configuration

    daily periodic subscribe to alert-group telemetry

    Cryptochecksum:7a817a8679e586dc829c06582c60811d

    : end

    keep deleted thos lines, you don't need these lines to your remote access VPN.

    Please tell me, what is the default gateway assigned on these hosts sitting on the mgmt network segment?

  • Several suppliers in weblogic even SQL authentication

    I have an ADF application which has a database of authentication. For this I need set a SQLProvider in the realms of WebLogic security, that is bound to data sources.

    Now, I want to deploy this same ADF application several times over WLS, each with different DataSource connection.

    To solve it, I modified my Application of ADF configuration to use an other JNDI Datasources. So I need to set a different data source in WLS with this JNDI, and I need another SqlAuthtentication provider in the field of security WLS.

    My question is this: I don't know how I can target an EAR deployment to use a particular security area. The result is a user that is defined in a DB could access all Aplications ADF since WLS was the union of all the users/passwords / groups.

    How can I solve it?

    I think that I could define a literal for groups in the configuration of authentication providers and define a filter security-> EAR deployment strategies.

    ADF 12 c and 12 c WLS

    Yes, you can set security policies (in the descriptors of deployment or the console) and set up of the groups in your database.

    -Faisal

  • I followed the instructions to enable cookies several times and have even reset Firefox to default settings, but can't connect to Google +?

    Whenever I try to access my Google account +, I get an error that says "feature browser cookies turned off, please enable.
    I followed the steps suggested, and my cookies are configured in the same way they have always been, I even reset Firefox settings by default twice, but nothing helped, Google don't keep saying my cookies functionality is not enabled?

    You can control and manage permissions for all areas on the Subject: authorizations page.

    Clear the cache and cookies from sites that cause problems.

    "Clear the Cache":

    • Tools > Options > advanced > network > content caching Web: 'clear now '.

    'Delete Cookies' sites causing problems:

    • Tools > Options > privacy > Cookies: "show the Cookies".

    If clearing cookies doesn't work, then it is possible that the cookies.sqlite file that stores the cookies is corrupted.

    Rename (or delete) cookies.sqlite (cookies.sqlite.old) and delete other files to present as cookie cookies.sqlite - journal in the profile folder of Firefox in the case where the cookies.sqlite file has been corrupted.

  • site to site vpn - internal network even on both sides of the tunnel

    Hi all

    I have the following questions about the Site Site VPN using ASA 5510 and 5505

    Scenerio is

    1. we have five branches & headquarters

    2. we want to establish a vpn between branches & Head Office (VPN from Site to Site)

    3. all branches & head office using the same internal network (192.168.150.0 255.255.255.0)

    My question is

    How can I configure VPN site-to-site between branches & head office with the same internal network (192.168.150.0/24)

    Please help me with the configuration steps & explanation

    I have experience on setting up vpn site to site between branches with differnet internal network (for example: 192.168.1.0/24 and 192.168.2.0/24)

    Waiting for your valuable response

    Hello

    Here are a few links on policy nat

    http://www.Cisco.com/en/us/products/HW/vpndevc/ps2030/products_configuration_example09186a00808c9950.shtml

    http://www.Cisco.com/en/us/products/ps6120/products_configuration_example09186a008046f31a.shtml#T10

    http://www.Cisco.com/en/us/products/ps6120/products_configuration_example09186a00807d2874.shtml

    Concerning

  • Several VPN site to Site

    Hello. I have a central router and 52 customer routers and I want these clients to connect to the central router with VPN. Advice or how the configuration on the clients and the server? Thanks in advance for any help.

    If you want to use SDM

    http://www.Cisco.com/en/us/Tech/tk583/TK372/technologies_white_paper0900aecd801af458.shtml

    If you use CLI

    http://www.Cisco.com/en/us/Tech/tk583/TK372/technologies_white_paper09186a008018983e.shtml

  • Several VPN clients behind PIX

    Multiple users in our company have establish a VPN client connection to a VPN Internet gateway. The connection must go through our PIX. I already active correction for esp - ike Protocol and this allows a user to get out. When following users try to configure a VPN connection to the VPN gateway on the internet, the following syslog error appears:

    3 PIX-305006%: failed to create translation portmap for udp src inside:192.168.0.102/500 dst outside:1x5.x17.x54.x10/500

    It seems to me that the PIX only supports an outbound VPN client connection at the time. Is this true?

    When I perform a clear xlate, first user disconnects, but new users is able to establish a VPN connection.

    Kind regards

    Tom

    That's right, Tom - in the release notes for 6.3 (1), the PAT for ESP section says "PIX Firewall version 6.3 provides protocol PAT IP 50 capacity to support unique outbound IPSec user."

    If you have enough public IP addresses and the remote VPN gateway supports PPTP, then a means to achieve multiple outbound VPN connections would be to set up a separate pool of the NAT for users who require outbound access and assign internal IP addresses of those users to use these addresses.

    Having had just a quick look around, if PPTP is an option, then the PPTP PAT 6.3 support can help.

  • Several VPN Client 1 LAN

    Hello

    We have 2 users who need to connect to our PIX 515 6.1 (4) using the client software of Cisco VPN Client 4.0.5 (Rel) on the Remote LAN Site.

    they all have access to the Internet Via Watchguard Firebox and router Cisco 1712.

    , but only one can access our VPN through the Cisco VPN client at the same time. When the 2nd user try to connect, the other connection of users disconnects.

    Does anyone have a question?

    You have this command in your pix

    ISAKMP nat-traversal

  • How to configure the site for several vpn site

    Hello

    We are in the process of upgrading the IT infrastructure n/w. Our headquarters is home to all servers. I want to establish a vpn between our head office and our 4 stores connectivity.

    Head offfice LAN - 192.168.1.0/24

    Remote Desktop

    1 LAN 1 - 10.1.1.0/24

    2 LAN 2 - 10.1.2.0/24

    3 LAN 3 - 10.1.3.0/24

    4 LAN 4-10.1.5.0/24

    I want to implement the ipsec through our internet vpn. An example of a config would be useful. Thank you

    Not very easy to find an example of a config...

    http://www.Cisco.com/en/us/Partner/Tech/tk583/TK372/technologies_configuration_example09186a0080094525.shtml

    But you have to ORC.

    Federico.

Maybe you are looking for