Here is my situation. I am evaluating the Firewall/VPN solution and have been having a hard time getting VPN working.
The firewall has 3 network cards. The WAN, LAN and DMZ. The WAN being the interface connected to our T1. The DMZ being the interface connected to the web/email servers. The LAN being the interface connected to the workstations. All interfaces uses public IP addresses subnetted from the same Class C network.
I use Cisco VPN Client v 3.02 to connect to a clients network, and would like to use it to also connect to my network remotely.
But, everytime I have attempted this, I run into problems. Either the authentication fails, or on one occasion, it actually caused the entire WAN to become blocked.
I have tried to follow the how-to's on the docs site, but some of them are woefully out-of-date. Not being a VPN specialist, I am unsure of how to proceed.
MOST of the VPN users will be coming from dynamic IP space, some will have static IP's. And most will also be behind a NAT device. I personally have a static DSL IP as home, but I use a DSL router that issues private IP's to the workstations with NAT.
Also, I would like to use our Windows NT 4.0 PDC for authentication, as it makes it the easiest to implement from a network admin point of view. I am not sure if that is the easiest method from the firewall's point of view.
Can anyone please provide me with some better detail on how to accomplish what I need?
This thread was automatically locked due to age.