In order to disable the SIP implementation- in global config mode on the router go to the policy map and remove the "inspect sip” line. We recommend a rollback to the previous version and will update when we have more information. This is bugging us a lot because we keep having to go through jump hosts and SSH forwarding in the office when working outside, which is really time consuming and doesn't work for everything.NOTE- As of IoS 9.1(6), we believe the SIP implementation to be broken. If not possible, how do you make it possible? Put a 元 switch behind the ASA and put routing logic in place there?.Is it possible to even set up this topology using a Cisco ASA 5505? If so, what do you do to make traffic flow from one VPN connection to another?.I understand that there may be some restrictions here because both the home endpoint and the production endpoint go into the "outer" interfaces. Our problem is that when connecting from home, it's not possible to connect to the production network at all, i.e. In addition, we have people connecting to the office firewall from home via IPSec client access. I'd like to see if somebody here can help me with an in-principle answer on which direction take.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |