<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic No.  The way you explained it in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/connecting-to-different-network/m-p/2616390#M197323</link>
    <description>&lt;P&gt;No.&amp;nbsp; The way you explained it, it is not possible.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You have a few options.&lt;/P&gt;&lt;P&gt;1) RDP into a remote server or remote desktop on the remote network through a management tunnel and you can then generate traffic from that subnet to properly test.&lt;/P&gt;&lt;P&gt;2) Have a person who is residing in the remote location on a call with you that can generate traffic accordingly.&lt;/P&gt;</description>
    <pubDate>Fri, 06 Feb 2015 03:56:10 GMT</pubDate>
    <dc:creator>David paull</dc:creator>
    <dc:date>2015-02-06T03:56:10Z</dc:date>
    <item>
      <title>Connecting to different network</title>
      <link>https://community.cisco.com/t5/network-security/connecting-to-different-network/m-p/2616387#M197320</link>
      <description>&lt;P&gt;Cisco support community,&lt;/P&gt;&lt;P&gt;I have a question about subnets and networks, I am a newbie at this so bear with me. &amp;nbsp;I am using MPLS to connect all of our sites, I have two offices each of which have a cisco asa, both on different subnets. &amp;nbsp;Subnet 1 : 192.168.2.x and &amp;nbsp;192.168.10.x.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am in the office on network .2, if i want to test a server etc. on network .10 but not in that office, how can I connect a new test firewall on that network while being in the .2 network?&lt;/P&gt;&lt;P&gt;Is this possible and what would I need for this?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 05:27:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connecting-to-different-network/m-p/2616387#M197320</guid>
      <dc:creator>eddie.sardinha</dc:creator>
      <dc:date>2019-03-12T05:27:25Z</dc:date>
    </item>
    <item>
      <title>Can you further define</title>
      <link>https://community.cisco.com/t5/network-security/connecting-to-different-network/m-p/2616388#M197321</link>
      <description>&lt;P&gt;Can you further define "connect" in "how can I connect a new test firewall on that network..."&lt;/P&gt;&lt;P&gt;It will be a while before I'm back to read the answer for this question but I think if you can broaden the context, the scope may become more clear.&amp;nbsp; I have read this at least 10 times and still do not understand what you are wanting to do.&lt;/P&gt;</description>
      <pubDate>Thu, 05 Feb 2015 16:50:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connecting-to-different-network/m-p/2616388#M197321</guid>
      <dc:creator>David paull</dc:creator>
      <dc:date>2015-02-05T16:50:32Z</dc:date>
    </item>
    <item>
      <title>Sure I want to connect a</title>
      <link>https://community.cisco.com/t5/network-security/connecting-to-different-network/m-p/2616389#M197322</link>
      <description>&lt;P&gt;Sure I want to connect a server and act like I am in the remote office whose network is on a different subnet for testing purposes. &amp;nbsp; If my office is on a 192.168.2 network but I want to connect like I am on the 192.168.10 network.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 05 Feb 2015 16:53:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connecting-to-different-network/m-p/2616389#M197322</guid>
      <dc:creator>eddie.sardinha</dc:creator>
      <dc:date>2015-02-05T16:53:31Z</dc:date>
    </item>
    <item>
      <title>No.  The way you explained it</title>
      <link>https://community.cisco.com/t5/network-security/connecting-to-different-network/m-p/2616390#M197323</link>
      <description>&lt;P&gt;No.&amp;nbsp; The way you explained it, it is not possible.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You have a few options.&lt;/P&gt;&lt;P&gt;1) RDP into a remote server or remote desktop on the remote network through a management tunnel and you can then generate traffic from that subnet to properly test.&lt;/P&gt;&lt;P&gt;2) Have a person who is residing in the remote location on a call with you that can generate traffic accordingly.&lt;/P&gt;</description>
      <pubDate>Fri, 06 Feb 2015 03:56:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connecting-to-different-network/m-p/2616390#M197323</guid>
      <dc:creator>David paull</dc:creator>
      <dc:date>2015-02-06T03:56:10Z</dc:date>
    </item>
    <item>
      <title>Is it possible with another</title>
      <link>https://community.cisco.com/t5/network-security/connecting-to-different-network/m-p/2616391#M197324</link>
      <description>&lt;P&gt;Is it possible with another internet connection and a firewall and then create a site to site VPN to the remote office firewall? &amp;nbsp;Then I would be on their LAN correct?&lt;/P&gt;</description>
      <pubDate>Fri, 06 Feb 2015 12:54:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connecting-to-different-network/m-p/2616391#M197324</guid>
      <dc:creator>eddie.sardinha</dc:creator>
      <dc:date>2015-02-06T12:54:16Z</dc:date>
    </item>
    <item>
      <title>With a s2s VPN tunnel, your</title>
      <link>https://community.cisco.com/t5/network-security/connecting-to-different-network/m-p/2616392#M197325</link>
      <description>&lt;P&gt;With a s2s VPN tunnel, your remote site basically becomes an extension of your local site (and vice versa).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Typically this is used so that, for example, your desktops that reside on 192.168.2.x can communicate with servers or whatever resources reside on 192.168.10.x through the internet, and do so securely.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This, by the way, is exactly what your MPLS already does, or should already be doing.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What you seem to be asking now is if you can belong to the same subnet as the remote devices.&amp;nbsp; Theoretically, you could, but I don't think it's a good idea to do that with a production network, and I've never seen it done.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You say that your goal in the original post is to test a server.&amp;nbsp; Why not just pick up the phone and have someone do it?&lt;/P&gt;</description>
      <pubDate>Fri, 06 Feb 2015 16:06:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connecting-to-different-network/m-p/2616392#M197325</guid>
      <dc:creator>David paull</dc:creator>
      <dc:date>2015-02-06T16:06:50Z</dc:date>
    </item>
    <item>
      <title>Ok thanks, I don't have</title>
      <link>https://community.cisco.com/t5/network-security/connecting-to-different-network/m-p/2616393#M197326</link>
      <description>&lt;P&gt;Ok thanks, I don't have another admin in that site.&amp;nbsp; I was thinking of a way to do testing before I sent a server to that site or get on a plane.&lt;/P&gt;</description>
      <pubDate>Sat, 07 Feb 2015 16:48:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connecting-to-different-network/m-p/2616393#M197326</guid>
      <dc:creator>eddie.sardinha</dc:creator>
      <dc:date>2015-02-07T16:48:40Z</dc:date>
    </item>
    <item>
      <title>Hi,If you are planning to</title>
      <link>https://community.cisco.com/t5/network-security/connecting-to-different-network/m-p/2616394#M197327</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;If you are planning to have a server on 192.168.10.0 network while you are in site with network 192.168.2.0, you could do this, but this network should be completely dis-connected from all other production networks to avoid any discrepancies/conflicts. In essence this network should not be routed, but exist as a VLAN with no routing enabled or restricted with VACL's, but can still be connected to ASA and can send and receive traffic from/to internet.&lt;/P&gt;</description>
      <pubDate>Sun, 08 Feb 2015 22:32:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connecting-to-different-network/m-p/2616394#M197327</guid>
      <dc:creator>APPIREDDY</dc:creator>
      <dc:date>2015-02-08T22:32:55Z</dc:date>
    </item>
  </channel>
</rss>

