<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: NAT Overlapping Networks in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-overlapping-networks/m-p/1709984#M556367</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well I rebooted the router and now it does not work.&amp;nbsp; I copied the config before I rebooted but it all looks the same.&amp;nbsp; I am not getting the errors I posted before but seems that I had something like a route or something that made it work....now I just need to figure out what.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 26 May 2011 16:52:18 GMT</pubDate>
    <dc:creator>phillipmoore1</dc:creator>
    <dc:date>2011-05-26T16:52:18Z</dc:date>
    <item>
      <title>NAT Overlapping Networks</title>
      <link>https://community.cisco.com/t5/network-security/nat-overlapping-networks/m-p/1709974#M556357</link>
      <description>&lt;P id="[object]"&gt;I know this subject is all over the place but I cannot find one that matches my scenario exactly.&amp;nbsp; I have 3 (or more) networks all with the same subnet that need to access a central NAS.&amp;nbsp; There is no external network here it is all standalone, but I figured I would put the NAS on the WAN of the outtermost router.&amp;nbsp;&amp;nbsp; I know I can do this with 4 cheap linksys routers. &lt;/P&gt;&lt;P id="[object]"&gt;&lt;/P&gt;&lt;P id="[object]"&gt;My main questions are:&lt;/P&gt;&lt;P id="[object]"&gt;1) Can I do this with a single cisco device using NAT to replace all the routers in the dotted red area. &lt;/P&gt;&lt;P id="[object]"&gt;2) If so does anyone have a recomendation/model on a device?&lt;/P&gt;&lt;P id="[object]"&gt;&lt;/P&gt;&lt;P id="[object]"&gt;Diagram is below:&lt;/P&gt;&lt;P id="[object]"&gt;&lt;/P&gt;&lt;P id="[object]"&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/legacy/5/8/6/47685-LabLayout2.png" alt="LabLayout2.png" class="jive-image" id="[object]" /&gt;&lt;/P&gt;&lt;P id="[object]"&gt;&lt;/P&gt;&lt;P id="[object]"&gt;Please forgive me if my terminology / diagrams are not exact, I am pretty new at this.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 20:30:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-overlapping-networks/m-p/1709974#M556357</guid>
      <dc:creator>phillipmoore1</dc:creator>
      <dc:date>2019-03-11T20:30:21Z</dc:date>
    </item>
    <item>
      <title>Re: NAT Overlapping Networks</title>
      <link>https://community.cisco.com/t5/network-security/nat-overlapping-networks/m-p/1709975#M556358</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You could do this with any Cisco router running advanced IP services feature set, such as 1800, 1900, 2800, 2900, etc. Do your switches support trunking and vlans? You will probably need to connect switches together on separate VLANs and then have one trunk interface to your router. I say this because these routers will only have two (1841, 1900, 2800, 2901) or three ethernet interfaces (2911&amp;gt;). Otherwise you can get additional ethernet interfaces with HWIC-4ESW, HWIC-1FE, HWIC-2FE. Make sure it's supported by the router model you get.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The feature to use would be VRF NAT. You must use VRFs as IOS won't allow you to have the same IP subnet on more than one interface without VRFs. In your case&amp;nbsp; you would put three 192.168.x.x/16 interfaces into individual VRFs and leave NAS interface in a global VRF. These interfaces don't necessary have to be physical interface, and could be subinterfaces with 802.1q encapsulation all running on a single physical interface as I mentioned in the first paragraph. The configuration would look like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip vrf LAN1&lt;/P&gt;&lt;P&gt; rd 1:1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip vrf LAN2&lt;/P&gt;&lt;P&gt; rd 2:2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip vrf LAN3&lt;/P&gt;&lt;P&gt; rd 3:3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;int fas0/0&lt;/P&gt;&lt;P&gt; no shut&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;int fas0/0.10&lt;/P&gt;&lt;P&gt; ip vrf forwarding LAN1&lt;/P&gt;&lt;P&gt; encapsulation dot1q 10&lt;/P&gt;&lt;P&gt; ip address 192.168.0.1 255.255.0.0&lt;/P&gt;&lt;P&gt; ip nat inside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;DIV&gt;&lt;P&gt;int fas0/0.20&lt;/P&gt;&lt;P&gt; ip vrf forwarding LAN2&lt;/P&gt;&lt;P&gt; encapsulation dot1q 20&lt;/P&gt;&lt;P&gt; ip address 192.168.0.1 255.255.0.0&lt;/P&gt;&lt;P&gt; ip nat inside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;DIV&gt;&lt;P&gt;int fas0/0.30&lt;/P&gt;&lt;P&gt; ip vrf forwarding LAN3&lt;/P&gt;&lt;P&gt; encapsulation dot1q 30&lt;/P&gt;&lt;P&gt; ip address 192.168.0.1 255.255.0.0&lt;/P&gt;&lt;P&gt; ip nat inside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;int fas0/0.40 (or fas0/1)&lt;/P&gt;&lt;P&gt; ip address 192.130.0.1 255.255.0.0&lt;/P&gt;&lt;P&gt; ip nat outside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-list 1 permit any&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip nat inside source list 1 interface fas0/0.40 vrf LAN1 overload&lt;/P&gt;&lt;DIV&gt;&lt;P&gt;ip nat inside source list 1 interface fas0/0.40 vrf LAN2 overload&lt;/P&gt;&lt;DIV&gt;&lt;P&gt;ip nat inside source list 1 interface fas0/0.40 vrf LAN3 overload&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip route vrf LAN1 0.0.0.0 0.0.0.0 fas0/0.40&lt;/P&gt;&lt;DIV&gt;&lt;P&gt;ip route vrf LAN2 0.0.0.0 0.0.0.0 fas0/0.40&lt;/P&gt;&lt;DIV&gt;&lt;P&gt;ip route vrf LAN3 0.0.0.0 0.0.0.0 fas0/0.40&lt;/P&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 May 2011 15:00:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-overlapping-networks/m-p/1709975#M556358</guid>
      <dc:creator>Roman Rodichev</dc:creator>
      <dc:date>2011-05-06T15:00:45Z</dc:date>
    </item>
    <item>
      <title>Re: NAT Overlapping Networks</title>
      <link>https://community.cisco.com/t5/network-security/nat-overlapping-networks/m-p/1709976#M556359</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P id="[object]"&gt;Thank you, I actually have a 2811 with a NM-16ESW etherswitch module that adds 16 ports to it.&amp;nbsp;&amp;nbsp; I noticed the ones you posted were WAN interface cards not etherswitch modules, will that make a difference?&lt;/P&gt;&lt;P id="[object]"&gt;&lt;/P&gt;&lt;P id="[object]"&gt;If not then I will give it a try and let you know.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 May 2011 12:15:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-overlapping-networks/m-p/1709976#M556359</guid>
      <dc:creator>phillipmoore1</dc:creator>
      <dc:date>2011-05-09T12:15:23Z</dc:date>
    </item>
    <item>
      <title>Re: NAT Overlapping Networks</title>
      <link>https://community.cisco.com/t5/network-security/nat-overlapping-networks/m-p/1709977#M556360</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Shouldn't make a difference. Instead of Fas0/0.x interfaces you will use VLANx interfaces.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 May 2011 13:25:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-overlapping-networks/m-p/1709977#M556360</guid>
      <dc:creator>Roman Rodichev</dc:creator>
      <dc:date>2011-05-09T13:25:43Z</dc:date>
    </item>
    <item>
      <title>Re: NAT Overlapping Networks</title>
      <link>https://community.cisco.com/t5/network-security/nat-overlapping-networks/m-p/1709978#M556361</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P id="[object]"&gt;&lt;SPAN style="font-color: [object]; font-family: [object]; font-id: [object]; font-size: [object]; font-style: background-color: #f8fafd;; "&gt;Sorry it took so long to get back but I am trying it out now and it seems to be hanging up when trying to mount the nas to both networks.&amp;nbsp; I do have one configuration line that looks important that I could not add in there.&amp;nbsp; "encapsulation ..."&amp;nbsp; I change the fas0/0.10&amp;nbsp; to VLAN10 .&amp;nbsp;&amp;nbsp; Should it be something like int VLAN10.10.&amp;nbsp; Also I did change the picture a little by not putting hte nas on the fas0.0 interface I thought I would try to just use one of the FastEthernet ports, maybe that was wrong.&amp;nbsp; Snippit of config is below&lt;/SPAN&gt;&lt;/P&gt;&lt;P id="[object]"&gt;&lt;/P&gt;&lt;P id="[object]"&gt;ip vrf LAN1&lt;/P&gt;&lt;P id="[object]"&gt;rd 1:1&lt;/P&gt;&lt;P id="[object]"&gt;!&lt;/P&gt;&lt;P&gt;ip vrf LAN2&lt;/P&gt;&lt;P&gt;rd 2:2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P id="[object]"&gt;ip vrf LAN3&lt;/P&gt;&lt;P id="[object]"&gt;rd 3:3&lt;/P&gt;&lt;P id="[object]"&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet1/0&lt;/P&gt;&lt;P id="[object]"&gt; description "THIS GOES TO THE NAS"&lt;BR /&gt; switchport access vlan 40&lt;BR /&gt; spanning-tree portfast&lt;BR /&gt;!&lt;/P&gt;&lt;P id="[object]"&gt;interface FastEthernet1/1&lt;BR /&gt; switchport access vlan 10&lt;BR /&gt; spanning-tree portfast&lt;BR /&gt;!&lt;/P&gt;&lt;P id="[object]"&gt;interface FastEthernet1/2&lt;BR /&gt; switchport access vlan 20&lt;BR /&gt; spanning-tree portfast&lt;/P&gt;&lt;P id="[object]"&gt;!&lt;BR /&gt;interface FastEthernet1/3&lt;BR /&gt; switchport access vlan 30&lt;BR /&gt; spanning-tree portfast&lt;BR /&gt;!&lt;/P&gt;&lt;P id="[object]"&gt;int VLAN10&lt;/P&gt;&lt;P id="[object]"&gt;&amp;nbsp; ip vrf forwarding LAN1&lt;/P&gt;&lt;P id="[object]"&gt;&amp;nbsp; encapsulation dot1q 10&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;---------------This line failed to get added. &lt;/P&gt;&lt;P id="[object]"&gt;&amp;nbsp; ip address 192.168.0.1 255.255.0.0&lt;/P&gt;&lt;P id="[object]"&gt;&amp;nbsp; ip nat inside&lt;/P&gt;&lt;P id="[object]"&gt;!&lt;/P&gt;&lt;P id="[object]"&gt;int VLAN20&lt;/P&gt;&lt;P id="[object]"&gt;&amp;nbsp; ip vrf forwarding LAN2&lt;/P&gt;&lt;P id="[object]"&gt;&amp;nbsp; encapsulation dot1q 20&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;---------------This line failed to get added. &lt;/P&gt;&lt;P id="[object]"&gt;&amp;nbsp; ip address 192.168.0.1 255.255.0.0&lt;/P&gt;&lt;P id="[object]"&gt;&amp;nbsp; ip nat inside&lt;/P&gt;&lt;P id="[object]"&gt;!&lt;/P&gt;&lt;P id="[object]"&gt;int VLAN30&lt;/P&gt;&lt;P id="[object]"&gt;&amp;nbsp; ip vrf forwarding LAN3&lt;/P&gt;&lt;P id="[object]"&gt;&amp;nbsp; encapsulation dot1q 30&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;---------------This line failed to get added. &lt;/P&gt;&lt;P id="[object]"&gt;&amp;nbsp; ip address 192.168.0.1 255.255.0.0&lt;/P&gt;&lt;P id="[object]"&gt;&amp;nbsp; ip nat inside&lt;/P&gt;&lt;P id="[object]"&gt;!&lt;/P&gt;&lt;P id="[object]"&gt;ip nat inside source list 1 interface VLAN40 vrf LAN1 overload&lt;/P&gt;&lt;DIV id="[object]"&gt;&lt;P id="[object]"&gt;ip nat inside source list 1 interface VLAN40 vrf LAN2 overload&lt;/P&gt;&lt;DIV id="[object]"&gt;&lt;P id="[object]"&gt;ip nat inside source list 1 interface VLAN40 vrf LAN3 overload&lt;/P&gt;&lt;P id="[object]"&gt;!&lt;/P&gt;&lt;P id="[object]"&gt;ip route vrf LAN1 0.0.0.0 0.0.0.0 VLAN40 0.0.0.0&lt;/P&gt;&lt;DIV id="[object]"&gt;&lt;P id="[object]"&gt;ip route vrf LAN2 0.0.0.0 0.0.0.0 VLAN40 0.0.0.0&lt;/P&gt;&lt;P id="[object]"&gt;ip route vrf LAN3 0.0.0.0 0.0.0.0 VLAN40 0.0.0.0&lt;/P&gt;&lt;P id="[object]"&gt;&lt;/P&gt;&lt;P id="[object]"&gt;&lt;/P&gt;&lt;DIV id="[object]"&gt; &lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 May 2011 19:50:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-overlapping-networks/m-p/1709978#M556361</guid>
      <dc:creator>phillipmoore1</dc:creator>
      <dc:date>2011-05-23T19:50:25Z</dc:date>
    </item>
    <item>
      <title>Re: NAT Overlapping Networks</title>
      <link>https://community.cisco.com/t5/network-security/nat-overlapping-networks/m-p/1709979#M556362</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;you don't need those commands because you are already using VLAN interfaces. VLAN number matches vlan number on the physical interface. You have switched interface card. If you used routed interfaces on the router, then you would use my config. You are ok.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In your configuration below, I don't see VLAN 40 interface, and how that connects physically.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 May 2011 22:11:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-overlapping-networks/m-p/1709979#M556362</guid>
      <dc:creator>Roman Rodichev</dc:creator>
      <dc:date>2011-05-23T22:11:35Z</dc:date>
    </item>
    <item>
      <title>Re: NAT Overlapping Networks</title>
      <link>https://community.cisco.com/t5/network-security/nat-overlapping-networks/m-p/1709980#M556363</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I switched my NAS to be back on the external interface since that matched my initial diagram (I dont know if it matters).&amp;nbsp; My full config is below:&amp;nbsp; With this config I dont see where I map what address get nat'd to what, maybe it does not matter.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;from system1 (192.168.110.20) I can ping my NAS (192.130.0.99) but when I try to map a drive using nfs I get RPC timeout.&amp;nbsp; I them checked the nat translations and they do not look correct to me. see below.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show ip nat translations&lt;BR /&gt;Pro Inside global&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Inside local&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Outside local&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Outside global&lt;BR /&gt;udp 192.130.0.1:32835&amp;nbsp; 192.168.110.20:32835 147.159.50.99:111 147.159.50.99:111&lt;BR /&gt;icmp 192.130.0.1:731&amp;nbsp;&amp;nbsp; 192.168.110.20:731 192.130.0.99:731&amp;nbsp;&amp;nbsp; 192.130.0.99:731&lt;BR /&gt;udp 192.130.0.1:32831&amp;nbsp; 192.168.110.20:32831 192.130.0.99:111 192.130.0.99:111&lt;BR /&gt;udp 192.130.0.1:32832&amp;nbsp; 192.168.110.20:32832 147.159.50.99:111 147.159.50.99:111&lt;BR /&gt;udp 192.130.0.1:32833&amp;nbsp; 192.168.110.20:32833 192.130.0.99:111 192.130.0.99:111&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any Ideas?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;config:&lt;/P&gt;&lt;P&gt;-------------------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;version 12.4&lt;BR /&gt;service timestamps debug datetime msec&lt;BR /&gt;service timestamps log datetime msec&lt;BR /&gt;no service password-encryption&lt;BR /&gt;!&lt;BR /&gt;hostname Router&lt;BR /&gt;!&lt;BR /&gt;boot-start-marker&lt;BR /&gt;boot-end-marker&lt;BR /&gt;!&lt;BR /&gt;logging message-counter syslog&lt;BR /&gt;!&lt;BR /&gt;no aaa new-model&lt;BR /&gt;!&lt;BR /&gt;dot11 syslog&lt;BR /&gt;ip source-route&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip cef&lt;BR /&gt;ip vrf LAN1&lt;BR /&gt; rd 1:1&lt;BR /&gt;!&lt;BR /&gt;ip vrf LAN2&lt;BR /&gt; rd 2:2&lt;BR /&gt;!&lt;BR /&gt;ip vrf LAN3&lt;BR /&gt; rd 3:3&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;no ipv6 cef&lt;BR /&gt;multilink bundle-name authenticated&lt;BR /&gt;voice-card 0&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;archive&lt;BR /&gt; log config&lt;BR /&gt;&amp;nbsp; hidekeys&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/0&lt;BR /&gt; ip address 192.130.0.1 255.255.0.0&lt;BR /&gt; ip nat outside&lt;BR /&gt; ip virtual-reassembly&lt;BR /&gt; duplex auto&lt;BR /&gt; speed auto&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/1&lt;BR /&gt; no ip address&lt;BR /&gt; shutdown&lt;BR /&gt; duplex auto&lt;BR /&gt; speed auto&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1/0&lt;BR /&gt; shutdown&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1/1&lt;BR /&gt; switchport access vlan 10&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1/2&lt;BR /&gt; switchport access vlan 20&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1/3&lt;BR /&gt; switchport access vlan 30&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1/4&lt;BR /&gt; shutdown&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1/5&lt;BR /&gt; shutdown&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1/6&lt;BR /&gt; shutdown&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1/7&lt;BR /&gt; shutdown&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1/8&lt;BR /&gt; shutdown&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1/9&lt;BR /&gt; shutdown&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1/10&lt;BR /&gt; shutdown&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1/11&lt;BR /&gt; shutdown&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1/12&lt;BR /&gt; shutdown&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1/13&lt;BR /&gt; shutdown&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1/14&lt;BR /&gt; shutdown&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1/15&lt;BR /&gt; shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Vlan10&lt;BR /&gt; ip vrf forwarding LAN1&lt;BR /&gt; ip address 192.168.0.1 255.255.0.0&lt;BR /&gt; ip nat inside&lt;BR /&gt; ip virtual-reassembly&lt;BR /&gt;!&lt;BR /&gt;interface Vlan20&lt;BR /&gt; ip vrf forwarding LAN2&lt;BR /&gt; ip address 192.168.0.1 255.255.0.0&lt;BR /&gt; ip nat inside&lt;BR /&gt; ip virtual-reassembly&lt;BR /&gt;!&lt;BR /&gt;interface Vlan30&lt;BR /&gt; ip vrf forwarding LAN3&lt;BR /&gt; ip address 192.168.0.1 255.255.0.0&lt;BR /&gt; ip nat inside&lt;BR /&gt; ip virtual-reassembly&lt;BR /&gt;!&lt;BR /&gt;ip forward-protocol nd&lt;BR /&gt;ip route vrf LAN1 0.0.0.0 0.0.0.0 FastEthernet0/0 0.0.0.0&lt;BR /&gt;ip route vrf LAN2 0.0.0.0 0.0.0.0 FastEthernet0/0 0.0.0.0&lt;BR /&gt;ip route vrf LAN3 0.0.0.0 0.0.0.0 FastEthernet0/0 0.0.0.0&lt;BR /&gt;no ip http server&lt;BR /&gt;no ip http secure-server&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip nat inside source list 1 interface FastEthernet0/0 vrf LAN1 overload&lt;BR /&gt;ip nat inside source list 1 interface FastEthernet0/0 vrf LAN2 overload&lt;BR /&gt;ip nat inside source list 1 interface FastEthernet0/0 vrf LAN3 overload&lt;BR /&gt;!&lt;BR /&gt;access-list 1 permit any&lt;BR /&gt;!&lt;BR /&gt;control-plane&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;line con 0&lt;BR /&gt;line aux 0&lt;BR /&gt;line vty 0 4&lt;BR /&gt; login&lt;BR /&gt;!&lt;BR /&gt;scheduler allocate 20000 1000&lt;BR /&gt;end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 May 2011 17:29:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-overlapping-networks/m-p/1709980#M556363</guid>
      <dc:creator>phillipmoore1</dc:creator>
      <dc:date>2011-05-24T17:29:13Z</dc:date>
    </item>
    <item>
      <title>Re: NAT Overlapping Networks</title>
      <link>https://community.cisco.com/t5/network-security/nat-overlapping-networks/m-p/1709981#M556364</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Configuration looks good and translations look good. Traffic is getting translated to the outside IP on the Fas0/0 interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't think NFS supports NAT &lt;SPAN __jive_emoticon_name="sad" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/sad.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 May 2011 19:56:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-overlapping-networks/m-p/1709981#M556364</guid>
      <dc:creator>Roman Rodichev</dc:creator>
      <dc:date>2011-05-24T19:56:11Z</dc:date>
    </item>
    <item>
      <title>Re: NAT Overlapping Networks</title>
      <link>https://community.cisco.com/t5/network-security/nat-overlapping-networks/m-p/1709982#M556365</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Something is still wrong though if I try to connect to the web server on the NAS it works from one but not the other.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I turn on ip nat debugging and I see both networks are getting natted to the same ip address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ping from network 1&lt;/P&gt;&lt;P&gt;*May 26 14:32:17.663: NAT: s=192.168.110.20-&amp;gt;192.130.0.1, d=192.130.0.99 [20599]&lt;BR /&gt;*May 26 14:32:17.663: NAT*: s=192.130.0.99, d=192.130.0.1-&amp;gt;192.168.110.20 [60203]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ping from network 2 (immediatly after)&lt;/P&gt;&lt;P&gt;*May 26 14:32:27.207: NAT: s=192.168.110.20-&amp;gt;192.130.0.1, d=192.130.0.99 [35398]&lt;BR /&gt;*May 26 14:32:27.211: NAT*: s=192.130.0.99, d=192.130.0.1-&amp;gt;192.168.110.20 [60204]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I would have thought network 1 would get natted to some address like 192.130.0.1 and network 2 would get nated to 192.130.0.2.&lt;/P&gt;&lt;P&gt;I tried to add something like the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip nat pool mynat 192.130.0.1 192.130.0.254 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;ip nat inside source list 1 pool mynat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This didnt change anything am i missing something?&lt;/P&gt;&lt;P&gt;I also turn on ip debugging and I am seeing this: Note the encapsulation failed at the bottom.&lt;/P&gt;&lt;P&gt;---------------------------------------------------------------------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*May 26 12:58:39.917: IP: s=192.168.110.20 (Vlan20), d=147.159.50.99, len 84, input feature, Stateful Inspection(4), rtype 0, forus FALSE, sendself FALSE, mtu 0,&lt;BR /&gt;fwdchk FALSE&lt;BR /&gt;*May 26 12:58:39.917: IP: s=192.168.110.20 (Vlan20), d=147.159.50.99, len 84, input feature, Virtual Fragment Reassembly(21), rtype 0, forus FALSE, sendself FALSE&lt;BR /&gt;, mtu 0, fwdchk FALSE&lt;BR /&gt;*May 26 12:58:39.917: IP: s=192.168.110.20 (Vlan20), d=147.159.50.99, len 84, input feature, Virtual Fragment Reassembly After IPSec Decryption(32), rtype 0, foru&lt;BR /&gt;s FALSE, sendself FALSE, mtu 0, fwdchk FALSE&lt;BR /&gt;*May 26 12:58:39.917: IP: s=192.168.110.20 (Vlan20), d=147.159.50.99, len 84, input feature, MCI Check(64), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FA&lt;BR /&gt;LSE&lt;BR /&gt;*May 26 12:58:39.917: IP: tableid=2, s=192.168.110.20 (Vlan20), d=147.159.50.99 (FastEthernet0/0), routed via RIB&lt;BR /&gt;*May 26 12:58:39.921: IP: s=192.168.110.20 (Vlan20), d=147.159.50.99 (FastEthernet0/0), len 84, output feature, CCE Output Classification(5), rtype 1, forus FALSE&lt;BR /&gt;, sendself FALSE, mtu 0, fwdchk FALSE&lt;BR /&gt;*May 26 12:58:39.921: NAT: s=192.168.110.20-&amp;gt;192.130.0.1, d=147.159.50.99 [9997]&lt;BR /&gt;*May 26 12:58:39.921: IP: s=192.130.0.1 (Vlan20), d=147.159.50.99 (FastEthernet0/0), len 84, output feature, Post-routing NAT Outside(17), rtype 1, forus FALSE, s&lt;BR /&gt;endself FALSE, mtu 0, fwdchk FALSE&lt;BR /&gt;*May 26 12:58:39.921: IP: s=192.130.0.1 (Vlan20), d=147.159.50.99 (FastEthernet0/0), len 84, output feature, Stateful Inspection(20), rtype 1, forus FALSE, sendse&lt;BR /&gt;lf FALSE, mtu 0, fwdchk FALSE&lt;BR /&gt;*May 26 12:58:39.921: IP: s=192.130.0.1 (Vlan20), d=147.159.50.99 (FastEthernet0/0), g=147.159.50.99, len 84, forward&lt;BR /&gt;*May 26 12:58:39.921: IP: s=192.130.0.1 (Vlan20), d=147.159.50.99 (FastEthernet0/0), len 84, encapsulation failed&lt;/P&gt;&lt;P&gt;---------------------------------------------------------------------------------------------------------------------------------------------&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 May 2011 14:37:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-overlapping-networks/m-p/1709982#M556365</guid>
      <dc:creator>phillipmoore1</dc:creator>
      <dc:date>2011-05-26T14:37:50Z</dc:date>
    </item>
    <item>
      <title>Re: NAT Overlapping Networks</title>
      <link>https://community.cisco.com/t5/network-security/nat-overlapping-networks/m-p/1709983#M556366</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I got it working.&amp;nbsp; Thanks so much for your help, I would not have gotten close without ya.&amp;nbsp; It seems that I had to have each vlan nat'd to a pool instead of a diret interface.&amp;nbsp; NOTE: This config file has to be tftp'd because the line "ip route vrf LAN1 0.0.0.0 0.0.0.0 FastEthernet0/0 0.0.0.0" gets saved as "ip route vrf LAN1 0.0.0.0 0.0.0.0 FastEthernet0/0" when you use config t but it needs the 0.0.0.0 on the end.&amp;nbsp; I dont know if this is a bug in the IOS or not.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;- Phillip&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--------------------------------------------------------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;version 12.4&lt;BR /&gt;service timestamps debug datetime msec&lt;BR /&gt;service timestamps log datetime msec&lt;BR /&gt;no service password-encryption&lt;BR /&gt;!&lt;BR /&gt;hostname Router&lt;BR /&gt;!&lt;BR /&gt;boot-start-marker&lt;BR /&gt;boot-end-marker&lt;BR /&gt;!&lt;BR /&gt;logging message-counter syslog&lt;BR /&gt;!&lt;BR /&gt;no aaa new-model&lt;BR /&gt;!&lt;BR /&gt;dot11 syslog&lt;BR /&gt;ip source-route&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip cef&lt;BR /&gt;ip vrf LAN1&lt;BR /&gt; rd 1:1&lt;BR /&gt;!&lt;BR /&gt;ip vrf LAN2&lt;BR /&gt; rd 2:2&lt;BR /&gt;!&lt;BR /&gt;ip vrf LAN3&lt;BR /&gt; rd 3:3&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/0&lt;BR /&gt; ip address 192.130.0.1 255.255.0.0&lt;BR /&gt; ip nat outside&lt;BR /&gt; ip virtual-reassembly&lt;BR /&gt; duplex auto&lt;BR /&gt; speed auto&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1/0&lt;BR /&gt; shutdown&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1/1&lt;BR /&gt; switchport access vlan 10&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1/2&lt;BR /&gt; switchport access vlan 20&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1/3&lt;BR /&gt; switchport access vlan 30&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Vlan10&lt;BR /&gt; ip vrf forwarding LAN1&lt;BR /&gt; ip address 192.168.0.1 255.255.0.0&lt;BR /&gt; ip nat inside&lt;BR /&gt; ip virtual-reassembly&lt;BR /&gt;!&lt;BR /&gt;interface Vlan20&lt;BR /&gt; ip vrf forwarding LAN2&lt;BR /&gt; ip address 192.168.0.1 255.255.0.0&lt;BR /&gt; ip nat inside&lt;BR /&gt; ip virtual-reassembly&lt;BR /&gt;!&lt;BR /&gt;interface Vlan30&lt;BR /&gt; ip vrf forwarding LAN3&lt;BR /&gt; ip address 192.168.0.1 255.255.0.0&lt;BR /&gt; ip nat inside&lt;BR /&gt; ip virtual-reassembly&lt;BR /&gt;!&lt;BR /&gt;ip forward-protocol nd&lt;BR /&gt;ip route vrf LAN1 0.0.0.0 0.0.0.0 FastEthernet0/0 0.0.0.0&lt;BR /&gt;ip route vrf LAN2 0.0.0.0 0.0.0.0 FastEthernet0/0 0.0.0.0&lt;BR /&gt;ip route vrf LAN3 0.0.0.0 0.0.0.0 FastEthernet0/0 0.0.0.0&lt;BR /&gt;no ip http server&lt;BR /&gt;no ip http secure-server&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip nat pool net1 192.101.0.0 192.101.0.254 netmask 255.255.0.0&lt;BR /&gt;ip nat pool net2 192.102.0.0 192.102.0.254 netmask 255.255.0.0&lt;BR /&gt;ip nat pool net3 192.103.0.0 192.103.0.254 netmask 255.255.0.0&lt;BR /&gt;ip nat inside source list 1 pool net1 vrf LAN1 overload&lt;BR /&gt;ip nat inside source list 1 pool net2 vrf LAN2 overload&lt;BR /&gt;ip nat inside source list 1 pool net3 vrf LAN3 overload&lt;BR /&gt;!&lt;BR /&gt;access-list 1 permit any&lt;BR /&gt;!&lt;BR /&gt;control-plane&lt;BR /&gt;!&lt;BR /&gt;end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 May 2011 15:58:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-overlapping-networks/m-p/1709983#M556366</guid>
      <dc:creator>phillipmoore1</dc:creator>
      <dc:date>2011-05-26T15:58:39Z</dc:date>
    </item>
    <item>
      <title>Re: NAT Overlapping Networks</title>
      <link>https://community.cisco.com/t5/network-security/nat-overlapping-networks/m-p/1709984#M556367</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well I rebooted the router and now it does not work.&amp;nbsp; I copied the config before I rebooted but it all looks the same.&amp;nbsp; I am not getting the errors I posted before but seems that I had something like a route or something that made it work....now I just need to figure out what.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 May 2011 16:52:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-overlapping-networks/m-p/1709984#M556367</guid>
      <dc:creator>phillipmoore1</dc:creator>
      <dc:date>2011-05-26T16:52:18Z</dc:date>
    </item>
    <item>
      <title>Re: NAT Overlapping Networks</title>
      <link>https://community.cisco.com/t5/network-security/nat-overlapping-networks/m-p/1709985#M556368</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Phillip,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you can certainly overload to an interface and don't need pools. You can have all three networks overload PAT to the same interface IP. If you look at the translation table, it shows vrf for each entry, so it knows how to untranslate the global port to a local port and which VRF to send that traffic back to. So that's not a problem for sure. By the way, in your configuraiton, you are PATing ONLY to the first IP in the pool because you are still using "overload" command, which means PAT (instead of NAT). If you remove overload command, then each client will get a new IP from the pool.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You might be having an issue with that static route. Static VRF routes that use to leak traffic from VRF interface to global interface indeed need both the interface and next-hop specified. Try specifying the next-hop as the IP of the outside interface. Let me know if that works.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Roman&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 May 2011 17:12:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-overlapping-networks/m-p/1709985#M556368</guid>
      <dc:creator>Roman Rodichev</dc:creator>
      <dc:date>2011-05-26T17:12:23Z</dc:date>
    </item>
    <item>
      <title>Re: NAT Overlapping Networks</title>
      <link>https://community.cisco.com/t5/network-security/nat-overlapping-networks/m-p/1709986#M556369</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Awesome!! That did it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I changed my ip route lines to look like &lt;STRONG&gt;"ip route vrf LAN1 0.0.0.0 0.0.0.0 FastEthernet0/0 192.130.0.99"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;I also removed the overlay option on the ip nat lines.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rebooted the router and all works great.&amp;nbsp;&amp;nbsp;&amp;nbsp; I really appreciate all the help.&amp;nbsp; I cannot tell you how many times I was told this will not work with a single device.&amp;nbsp; Thanks for sticking through it with me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Phillip&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 May 2011 03:04:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-overlapping-networks/m-p/1709986#M556369</guid>
      <dc:creator>phillipmoore1</dc:creator>
      <dc:date>2011-05-27T03:04:49Z</dc:date>
    </item>
  </channel>
</rss>

