
4-3
Cisco PIX Firewall and VPN Configuration Guide
78-15033-01
Chapter 4 Using PIX Firewall in SOHO Networks
Using PIX Firewall as an Easy VPN Remote Device
Figure 4-2 Using the PIX Firewall in Client Mode
Internet
83964
PIX Firewall 501
or 506/506E
Easy VPN Server
ISP router
192.168.100.4
192.168.100.3
192.168.200.3
Address hidden
from central LAN
Address visible
from remote LAN
Remote LAN Central LAN
As shown in Figure 4-2, client mode causes VPN connections to be initiated by traffic, so resources are
only used on demand. In client mode, the PIX Firewall applies Network Address Translation (NAT) to
all IP addresses of clients connected to the inside (higher security) interface of the PIX
Firewall. To use
this mode, you must also enable the DHCP server on the inside interface, as described in “
Using the PIX
Firewall DCHP Server.”
Figure 4-3 Using the PIX Firewall in Network Extension Mode
Internet
104032
PIX Firewall 501
or 506/506E
Easy VPN Server
ISP router
192.168.100.4
192.168.100.3
192.168.200.3
Address visible
from central LAN
Address visible
from remote LAN
Remote LAN Central LAN
Figure 4-3 illustrates network extension mode. In this mode, VPN connections are kept open even when
not required for transmitting traffic. This option does not apply NAT to any IP addresses of clients on
the inside (higher security) interface of the PIX
Firewall.
In network extension mode, the IP addresses of clients on the inside interface are received without
change at the Easy VPN Server. If these addresses are registered with the Network Information Center
(NIC), they may be forwarded to the public Internet without further processing. Otherwise, they may be
translated by the Easy VPN Server or forwarded to a private network without translation.
Komentarze do niniejszej Instrukcji