<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Site-Site with same networks in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/site-site-with-same-networks/m-p/1331423#M949209</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Understood..  but what routes do you required in the far router?  are you refering to requiring static routes to get to other networks behind your ASA through that tunnel?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 08 Sep 2009 15:02:29 GMT</pubDate>
    <dc:creator>JORGE RODRIGUEZ</dc:creator>
    <dc:date>2009-09-08T15:02:29Z</dc:date>
    <item>
      <title>Site-Site with same networks</title>
      <link>https://community.cisco.com/t5/network-security/site-site-with-same-networks/m-p/1331418#M949201</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want to know if is possible create a VPN where the remote and local network be the same, and what requirements this has.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 11:39:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-site-with-same-networks/m-p/1331418#M949201</guid>
      <dc:creator>svelasquez</dc:creator>
      <dc:date>2020-02-21T11:39:53Z</dc:date>
    </item>
    <item>
      <title>Re: Site-Site with same networks</title>
      <link>https://community.cisco.com/t5/network-security/site-site-with-same-networks/m-p/1331419#M949203</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It is possible, you need to use  Policy NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00808c9950.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00808c9950.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Sep 2009 01:33:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-site-with-same-networks/m-p/1331419#M949203</guid>
      <dc:creator>JORGE RODRIGUEZ</dc:creator>
      <dc:date>2009-09-08T01:33:50Z</dc:date>
    </item>
    <item>
      <title>Re: Site-Site with same networks</title>
      <link>https://community.cisco.com/t5/network-security/site-site-with-same-networks/m-p/1331420#M949205</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok, but when i make a Policy NAT i translate my LAN network to another ip that by routing can access to the remote network, but in my case i need this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have an ASA 5505 and a 1700 router, they make the vpn and works fine, my asa has the LAN 192.168.2.0/24 and the 1700 the 192.168.1.0/24, the thing is that i need to change the network in the asa to 192.168.1.0/24 and both branchs must have communication&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope be clear&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Sep 2009 13:28:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-site-with-same-networks/m-p/1331420#M949205</guid>
      <dc:creator>svelasquez</dc:creator>
      <dc:date>2009-09-08T13:28:33Z</dc:date>
    </item>
    <item>
      <title>Re: Site-Site with same networks</title>
      <link>https://community.cisco.com/t5/network-security/site-site-with-same-networks/m-p/1331421#M949207</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sebastian, I miss understood your initial post..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You are saying that you current have disimilar LANs  yours being 192.168.2.0  adn other end is 192.168.1.0  and vpn tunnel is fine.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But your requirements is to have both ends be the same network 192.168.1.0 network? if so you will have overlaping networks, even if you use policy nat to present your 192.168.2.0 from the ASA as 192.168.1.0 network is not going to work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a reason behind  your requirements to have both LANs over the tunnel be the same?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Sep 2009 14:27:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-site-with-same-networks/m-p/1331421#M949207</guid>
      <dc:creator>JORGE RODRIGUEZ</dc:creator>
      <dc:date>2009-09-08T14:27:52Z</dc:date>
    </item>
    <item>
      <title>Re: Site-Site with same networks</title>
      <link>https://community.cisco.com/t5/network-security/site-site-with-same-networks/m-p/1331422#M949208</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jorge, thath's rigth&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have disimilar LANs with 192.168.1.0 and 192.168.2.0 and in that case the tunnel is fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The reason what i need to change the lan network in the ASA is because in the remote network there is an ISP that have the routes to access remote networks and no authorized the creation of a static route to know the network of the asa through the tunnel, so i think that if i create a tunnel having the sames networks can work&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Sep 2009 14:39:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-site-with-same-networks/m-p/1331422#M949208</guid>
      <dc:creator>svelasquez</dc:creator>
      <dc:date>2009-09-08T14:39:01Z</dc:date>
    </item>
    <item>
      <title>Re: Site-Site with same networks</title>
      <link>https://community.cisco.com/t5/network-security/site-site-with-same-networks/m-p/1331423#M949209</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Understood..  but what routes do you required in the far router?  are you refering to requiring static routes to get to other networks behind your ASA through that tunnel?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Sep 2009 15:02:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-site-with-same-networks/m-p/1331423#M949209</guid>
      <dc:creator>JORGE RODRIGUEZ</dc:creator>
      <dc:date>2009-09-08T15:02:29Z</dc:date>
    </item>
    <item>
      <title>Re: Site-Site with same networks</title>
      <link>https://community.cisco.com/t5/network-security/site-site-with-same-networks/m-p/1331424#M949210</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The far router manage the routes to other cities that i need access, and how they don't create the route to know the network behind the tunnel i can't access to other cities, so if i could have the same network address in the ASA LAN i can routing how i need&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Sep 2009 15:23:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-site-with-same-networks/m-p/1331424#M949210</guid>
      <dc:creator>svelasquez</dc:creator>
      <dc:date>2009-09-08T15:23:41Z</dc:date>
    </item>
    <item>
      <title>Re: Site-Site with same networks</title>
      <link>https://community.cisco.com/t5/network-security/site-site-with-same-networks/m-p/1331425#M949211</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think Im understanding your topology,in your current L2L tunnel you should be able to add those networks the router connects to into your Ipsec policy interesting traffic  and be able to access those networks from the ASA side, have you try adding those remote networks in your Ipsec policy?  &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Sep 2009 15:54:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-site-with-same-networks/m-p/1331425#M949211</guid>
      <dc:creator>JORGE RODRIGUEZ</dc:creator>
      <dc:date>2009-09-08T15:54:50Z</dc:date>
    </item>
    <item>
      <title>Re: Site-Site with same networks</title>
      <link>https://community.cisco.com/t5/network-security/site-site-with-same-networks/m-p/1331426#M949212</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well, but if i add the routes in the tunnel and the far router has not routes to return the information i willn't see the remote networks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Example: ASA: 192.168.2.1 1700:192.168.1.1 FARouter: 192.168.1.254 Another net:10.10.10.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If no exist the route add 192.168.2.0 255.255.255.0 192.168.1.1 command in the FARouter i have not chance of access the 10.10.10.0 or i don't see how through the tunnel&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or if you can explane me more i appreciate it&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Sep 2009 19:18:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-site-with-same-networks/m-p/1331426#M949212</guid>
      <dc:creator>svelasquez</dc:creator>
      <dc:date>2009-09-08T19:18:59Z</dc:date>
    </item>
    <item>
      <title>Re: Site-Site with same networks</title>
      <link>https://community.cisco.com/t5/network-security/site-site-with-same-networks/m-p/1331427#M949213</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do you have a simple graph you can post we can see topoloy, Im confused, if at FArouter1700  is routing 10.10.10.0 net that is directly connected to that router say from another interface I still do not believe you have to place a route there for that router to know about ASA 192.168.2.0.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The FarRouter1700 already routes 10.10.10.0 net and I believe by puting 10.10.10.0 network in your tunnel policy access list, ASA_192.168.2.0 should be able to talk to that network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;now if 10.10.10.0 is not a  directly connected network to the 1700 but is  being routed  via another interface from the 1700  router remote network then I could say you will need a route 192.168.2.0/24  on that far end router where 10.10.10.0 actually resides pointing to the 1700 router...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How is 10.10.10.0 network learnd at the 1700 router..  again if you could post a simple diagram that would help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  &lt;/P&gt;&lt;P&gt;I think what you are trying to do is to place that static route in the 1700 series so it can propagate to other remote network off the 1700? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Sep 2009 21:36:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-site-with-same-networks/m-p/1331427#M949213</guid>
      <dc:creator>JORGE RODRIGUEZ</dc:creator>
      <dc:date>2009-09-08T21:36:42Z</dc:date>
    </item>
    <item>
      <title>Re: Site-Site with same networks</title>
      <link>https://community.cisco.com/t5/network-security/site-site-with-same-networks/m-p/1331428#M949214</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have the second case&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if 10.10.10.0 is not a directly connected network to the 1700 but is being routed via another interface from the 1700 router remote network then I could say you will need a route 192.168.2.0/24 on that far end router where 10.10.10.0 actually resides pointing to the 1700 router... &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But the problem is that the routers admins of the other router not authorized the creation of the route to go to my asa network, so i can't access to the 10.10.10.0 network&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Sep 2009 22:10:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-site-with-same-networks/m-p/1331428#M949214</guid>
      <dc:creator>svelasquez</dc:creator>
      <dc:date>2009-09-08T22:10:22Z</dc:date>
    </item>
    <item>
      <title>Re: Site-Site with same networks</title>
      <link>https://community.cisco.com/t5/network-security/site-site-with-same-networks/m-p/1331429#M949215</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sebastian,  thanks for the diagram..,  that indeed is a big problem not being able to place route  pointing to 192.168.1.1 as seen in diagram..  with that static route there in adition to adding 10.10.10.0 in the tunnel policy I could be very sure ASA_192.168.2.0 will talk to that network ..   can you present to your management the need to have that done and escalate to the ISP if router is not managed by you?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;lest say above static routes cannot be put in place anyhow.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Im thinking that maybe, just maybe.. you could allocate/reserve an IP from the 192.168.1.x net say 192.168.1.100 to not be in any way used in this 192.168.1.0 network and use that IP in ASA to PAT 192.168.2.0 network from the ASA side when going to 10.10.10.0 but to be  honest I don't know if it will actually work.. I could be totaly wrong with this scenario, additionally it will change the whole expectrum of your current tunnel config to end up with non-working scenario..  I would have to lab this out but do not have the time at this moment and would not recommend to go any other way to make this simple ... your best bet is placing those routes  as you have originally thought..  route 192.168.2.0 via 192.168.1.1 and acl taylor in tunnel policy should do the trick.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Perhaps others netpro may share some other thoughts on this..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Sep 2009 02:09:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-site-with-same-networks/m-p/1331429#M949215</guid>
      <dc:creator>JORGE RODRIGUEZ</dc:creator>
      <dc:date>2009-09-09T02:09:31Z</dc:date>
    </item>
  </channel>
</rss>

