<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic At first glance you config in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/overlapping-subnets-l2l-vpn-configuration-problems/m-p/2501658#M225809</link>
    <description>&lt;P&gt;At first glance you config looks correct.&amp;nbsp; The problem is that you are NATing the full subnets of each side.&amp;nbsp; Do all PCs on the 10.30 network need to reach all IPs on the 10.10 network?&amp;nbsp;&lt;/P&gt;&lt;P&gt;You will most likely need to configure static destination NAT for each server you are trying to reach at both ends of the VPN tunnel.&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
    <pubDate>Wed, 17 Sep 2014 21:36:01 GMT</pubDate>
    <dc:creator>Marius Gunnerud</dc:creator>
    <dc:date>2014-09-17T21:36:01Z</dc:date>
    <item>
      <title>overlapping subnets L2L VPN configuration problems</title>
      <link>https://community.cisco.com/t5/network-security/overlapping-subnets-l2l-vpn-configuration-problems/m-p/2501657#M225808</link>
      <description>&lt;P&gt;I just cannot get it to work.&amp;nbsp; I need devices on siteA to connect to devices on siteB, both with overlapping IP's.&amp;nbsp; Then if I am at siteA and want to ping siteB server at 10.10.10.100, what IP do I ping?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I hope I make sense, because L2L vpn is kicking my butt with these overlapping subnets.&amp;nbsp; Thanks!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;siteA:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.0(2)&lt;BR /&gt;!&lt;BR /&gt;------------------&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 1.1.1.1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1.5&lt;BR /&gt;&amp;nbsp;vlan 5&lt;BR /&gt;&amp;nbsp;nameif DOMAIN&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 10.50.5.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1.99&lt;BR /&gt;&amp;nbsp;vlan 99&lt;BR /&gt;&amp;nbsp;nameif HP_MGMT&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 10.50.99.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1.100&lt;BR /&gt;&amp;nbsp;vlan 100&lt;BR /&gt;&amp;nbsp;nameif WIRED&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 10.50.2.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1.101&lt;BR /&gt;&amp;nbsp;vlan 101&lt;BR /&gt;&amp;nbsp;nameif WIRELESS&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 10.50.3.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1.1005&lt;BR /&gt;&amp;nbsp;vlan 1005&lt;BR /&gt;&amp;nbsp;nameif Pelco_MGMT&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 10.100.5.2 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2.1&lt;BR /&gt;&amp;nbsp;vlan 1&lt;BR /&gt;&amp;nbsp;nameif S2&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 10.10.10.1 255.255.0.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;&amp;nbsp;nameif management&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 10.50.0.1 255.255.255.0&lt;BR /&gt;&amp;nbsp;management-only&lt;BR /&gt;!&lt;BR /&gt;------------------&lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa802-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone CST -6&lt;BR /&gt;clock summer-time CDT recurring&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;&amp;nbsp;domain-name default.domain.invalid&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object-group protocol TCPUDP&lt;BR /&gt;&amp;nbsp;protocol-object udp&lt;BR /&gt;&amp;nbsp;protocol-object tcp&lt;BR /&gt;access-list L2LAccessList extended permit ip 10.20.0.0 255.255.0.0 10.10.0.0 255.255.0.0&lt;BR /&gt;access-list SRC_Translation extended permit ip 10.10.0.0 255.255.0.0 10.30.0.0 255.255.0.0&lt;BR /&gt;pager lines 24&lt;BR /&gt;------------------&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu DOMAIN 1500&lt;BR /&gt;mtu HP_MGMT 1500&lt;BR /&gt;mtu WIRED 1500&lt;BR /&gt;mtu WIRELESS 1500&lt;BR /&gt;mtu Pelco_MGMT 1500&lt;BR /&gt;mtu S2 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any HP_MGMT&lt;BR /&gt;icmp permit any WIRELESS&lt;BR /&gt;icmp permit any S2&lt;BR /&gt;asdm image disk0:/asdm-602.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;nat (DOMAIN) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;nat (WIRED) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;nat (WIRELESS) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;nat (S2) 1 10.10.0.0 255.255.0.0&lt;BR /&gt;static (DOMAIN,outside) tcp interface https 10.50.5.5 https netmask 255.255.255.255&lt;BR /&gt;static (WIRELESS,outside) tcp interface 3389 10.50.3.49 3389 netmask 255.255.255.255&lt;BR /&gt;static (S2,WIRELESS) 10.10.0.0 10.10.0.0 netmask 255.255.0.0&lt;BR /&gt;static (S2,DOMAIN) 10.10.0.0 10.10.0.0 netmask 255.255.0.0&lt;BR /&gt;static (WIRED,WIRELESS) 10.50.2.0 10.50.2.0 netmask 255.255.255.0&lt;BR /&gt;static (HP_MGMT,WIRELESS) 10.50.99.0 10.50.99.0 netmask 255.255.255.0&lt;BR /&gt;static (Pelco_MGMT,WIRELESS) 10.100.5.0 10.100.5.0 netmask 255.255.255.0&lt;BR /&gt;static (DOMAIN,WIRELESS) 10.50.5.0 10.50.5.0 netmask 255.255.255.0&lt;BR /&gt;static (DOMAIN,S2) 10.50.5.0 10.50.5.0 netmask 255.255.255.0&lt;BR /&gt;static (WIRELESS,DOMAIN) 10.50.3.0 10.50.3.0 netmask 255.255.255.0&lt;BR /&gt;static (WIRELESS,Pelco_MGMT) 10.50.3.0 10.50.3.0 netmask 255.255.255.0&lt;BR /&gt;static (WIRELESS,S2) 10.50.3.0 10.50.3.0 netmask 255.255.255.0&lt;BR /&gt;static (WIRELESS,WIRED) 10.50.3.0 10.50.3.0 netmask 255.255.255.0&lt;BR /&gt;static (WIRELESS,HP_MGMT) 10.50.3.0 10.50.3.0 netmask 255.255.255.0&lt;BR /&gt;static (S2,outside) 10.20.0.0&amp;nbsp; access-list SRC_Translation&lt;BR /&gt;static (outside,S2) 10.30.0.0 10.10.0.0 netmask 255.255.0.0&lt;BR /&gt;access-group OUTSIDE-IN in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 x&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout uauth 0:05:00 absolute&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;http server enable&lt;BR /&gt;http 10.50.0.0 255.255.255.0 management&lt;BR /&gt;http 10.50.3.0 255.255.255.0 WIRELESS&lt;BR /&gt;http redirect outside 443&lt;BR /&gt;------------------&lt;BR /&gt;crypto ipsec transform-set MYSET esp-aes esp-sha-hmac&lt;BR /&gt;crypto map MYMAP 10 match address L2LAccessList&lt;BR /&gt;crypto map MYMAP 10 set peer 2.2.2.2&lt;BR /&gt;crypto map MYMAP 10 set transform-set MYSET&lt;BR /&gt;crypto map MYMAP 10 set reverse-route&lt;BR /&gt;crypto map MYMAP interface outside&lt;BR /&gt;crypto isakmp enable outside&lt;BR /&gt;crypto isakmp policy 65535&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption aes&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;telnet 10.50.3.0 255.255.255.0 WIRELESS&lt;BR /&gt;telnet 0.0.0.0 0.0.0.0 management&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 10.50.3.0 255.255.255.0 WIRELESS&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 10&lt;BR /&gt;management-access WIRELESS&lt;BR /&gt;dhcpd dns 10.50.5.3 12.127.17.71&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 10.50.5.50-10.50.5.254 DOMAIN&lt;BR /&gt;dhcpd enable DOMAIN&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 10.50.2.50-10.50.2.254 WIRED&lt;BR /&gt;dhcpd enable WIRED&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 10.50.3.50-10.50.3.254 WIRELESS&lt;BR /&gt;dhcpd enable WIRELESS&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 10.10.2.50-10.10.2.254 S2&lt;BR /&gt;dhcpd enable S2&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 10.50.0.2-10.50.0.10 management&lt;BR /&gt;dhcpd enable management&lt;BR /&gt;!&lt;BR /&gt;vpn load-balancing&lt;BR /&gt;&amp;nbsp;interface lbprivate DOMAIN&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection scanning-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect skinny &amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect sip &amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;------------------&lt;BR /&gt;tunnel-group 2.2.2.2 type ipsec-l2l&lt;BR /&gt;tunnel-group 2.2.2.2 ipsec-attributes&lt;BR /&gt;&amp;nbsp;pre-shared-key *&lt;BR /&gt;smtp-server 10.50.5.3&lt;BR /&gt;------------------&lt;BR /&gt;: end&lt;BR /&gt;asdm image disk0:/asdm-602.bin&lt;BR /&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;siteB:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.0(2)&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 2.2.2.2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 10.60.5.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2.1&lt;BR /&gt;&amp;nbsp;vlan 1&lt;BR /&gt;&amp;nbsp;nameif S2&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 10.10.10.1 255.255.0.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;&amp;nbsp;nameif management&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 10.50.0.1 255.255.255.0&lt;BR /&gt;&amp;nbsp;management-only&lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa802-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone CST -6&lt;BR /&gt;clock summer-time CDT recurring&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;&amp;nbsp;domain-name default.domain.invalid&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;access-list L2LAccessList extended permit ip 10.30.0.0 255.255.0.0 10.10.0.0 255.255.0.0&lt;BR /&gt;access-list SRC_Translation extended permit ip 10.10.0.0 255.255.0.0 10.20.0.0 255.255.0.0&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;mtu S2 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp deny any outside&lt;BR /&gt;asdm image disk0:/asdm-602.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;static (S2,outside) 10.30.0.0&amp;nbsp; access-list SRC_Translation&lt;BR /&gt;static (outside,S2) 10.20.0.0 10.10.0.0 netmask 255.255.0.0&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 x&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout uauth 0:05:00 absolute&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;http server enable&lt;BR /&gt;http 10.50.0.0 255.255.255.0 management&lt;BR /&gt;http 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec transform-set MYSET esp-aes esp-sha-hmac&lt;BR /&gt;crypto map MYMAP 10 match address L2LAccessList&lt;BR /&gt;crypto map MYMAP 10 set peer 1.1.1.1&lt;BR /&gt;crypto map MYMAP 10 set transform-set MYSET&lt;BR /&gt;crypto map MYMAP 10 set reverse-route&lt;BR /&gt;crypto map MYMAP interface outside&lt;BR /&gt;crypto isakmp enable outside&lt;BR /&gt;crypto isakmp policy 65535&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption aes&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;telnet 10.50.0.0 255.255.255.0 management&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcpd dns 10.50.3.10 129.250.35.250&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 10.60.5.50-10.60.5.250 inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 10.50.0.2-10.50.0.254 management&lt;BR /&gt;dhcpd enable management&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 10.10.3.50-10.10.3.250 S2&lt;BR /&gt;dhcpd enable S2&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection scanning-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect skinny &amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect sip &amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;tunnel-group 1.1.1.1 type ipsec-l2l&lt;BR /&gt;tunnel-group 1.1.1.1 ipsec-attributes&lt;BR /&gt;&amp;nbsp;pre-shared-key *&lt;BR /&gt;prompt hostname context&lt;BR /&gt;Cryptochecksum:57be0559bfc1270fdff4f32743f6b9d7&lt;BR /&gt;: end&lt;BR /&gt;asdm image disk0:/asdm-602.bin&lt;BR /&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:46:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/overlapping-subnets-l2l-vpn-configuration-problems/m-p/2501657#M225808</guid>
      <dc:creator>hmongstrong</dc:creator>
      <dc:date>2019-03-12T04:46:12Z</dc:date>
    </item>
    <item>
      <title>At first glance you config</title>
      <link>https://community.cisco.com/t5/network-security/overlapping-subnets-l2l-vpn-configuration-problems/m-p/2501658#M225809</link>
      <description>&lt;P&gt;At first glance you config looks correct.&amp;nbsp; The problem is that you are NATing the full subnets of each side.&amp;nbsp; Do all PCs on the 10.30 network need to reach all IPs on the 10.10 network?&amp;nbsp;&lt;/P&gt;&lt;P&gt;You will most likely need to configure static destination NAT for each server you are trying to reach at both ends of the VPN tunnel.&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Wed, 17 Sep 2014 21:36:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/overlapping-subnets-l2l-vpn-configuration-problems/m-p/2501658#M225809</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-09-17T21:36:01Z</dc:date>
    </item>
    <item>
      <title>Most likely just the server</title>
      <link>https://community.cisco.com/t5/network-security/overlapping-subnets-l2l-vpn-configuration-problems/m-p/2501659#M225810</link>
      <description>&lt;P&gt;Most likely just the server on either end should suffice.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;siteA should be able to see siteB's internal 10.10.10.100&lt;/LI&gt;&lt;LI&gt;siteB should see siteA internal 10.10.10.70&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do I change my static statement and access list configs then?&lt;/P&gt;</description>
      <pubDate>Thu, 18 Sep 2014 12:41:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/overlapping-subnets-l2l-vpn-configuration-problems/m-p/2501659#M225810</guid>
      <dc:creator>hmongstrong</dc:creator>
      <dc:date>2014-09-18T12:41:28Z</dc:date>
    </item>
    <item>
      <title>Since the IPs are overlapping</title>
      <link>https://community.cisco.com/t5/network-security/overlapping-subnets-l2l-vpn-configuration-problems/m-p/2501660#M225811</link>
      <description>&lt;P&gt;Since the IPs are overlapping you need to decide on an IP for the two hosts that that do not overlap. And then NAT the local IPs to that new IP.&amp;nbsp; This new IP will also need to be included in the crypto ACL as the destination IP.&lt;/P&gt;&lt;P&gt;So, for example, siteA will use IP 172.16.1.100 to reach 10.10.10.100&lt;/P&gt;&lt;P&gt;and siteB will use IP 172.16.2.70 to reach 10.10.10.70&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list VPN permit ip 10.10.10.0 255.255.255.0 host 172.16.2.70&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (S2) 0 access-list VPN&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;As long as 172.16.2.0/24 is not a configured network at siteA then the default route will take care of routing.&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Fri, 19 Sep 2014 06:48:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/overlapping-subnets-l2l-vpn-configuration-problems/m-p/2501660#M225811</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-09-19T06:48:28Z</dc:date>
    </item>
  </channel>
</rss>

