I have a client with 5 computers in a private LAN behind a DSL/Routing
box (ActionTec GT701-WG). Each of these computers needs simultaneous
access to a VPN using Cisco's software VPN client. There is no
problem when each machine connects independently, but I can't get more
than one to connect at once (since the other end of the VPN sees them
as coming from the same public IP).
So, I have purchased five public IPs from my ISP. Now here's my
problem--the LAN needs to maintain security so I do not want to just
assign the five public IPs directly to the LAN PCs and route
everything straight to them. Is there some way that I can shield the
LAN PCs behind my NATing router but still have the VPN connections
that originate from the LAN PCs appear to come from my five different
public IPs?
I can't afford a fancy managed router for this client, but the
ActionTec box does support static routing. The problem is I don't
know how to configure what I want (or even what the terminology for
this is). If the ActionTec box is inadequate for this task, I also
have a linux box (running ClarkConnect) that I could add into their
network and have take over routing functionality.
As a side note--there is also a Windows 2000 server in this network
that handles local DHCP (rather than the ActionTec box), but I don't
want to use it for public routing--again because of security concerns.
Thanks for your help. In composing your response, I am not a
networking expert (no Cisco certs, etc...), but do understand the
basics of NAT/DHCP/DNS/IP.
Thanks! |