I have a customer who wants to migrate between offices within the same city slowly across a couple of weeks. They want to have the same subnet in two locations without actually forwarding L2 traffic across the internet. I suggested we setup a bi-directional NAT scenario. I know it will be some effort, but I believe I can set that up.
The scenario is Site A and Site B both are in the same city. Site A will have a VPN tunnel to Site B with ASAs on both sides of the tunnel, and both sites will have a subnet of 10.10.10.0/24. I plan on configuring NAT to trick that into working. Now, we have Site C in another city that needs to talk to 10.10.10.0/24 - and that VPN is currently working from Site C to Site B. They want to have VPN traffic initiated from Site C through Site B to Site A.
I don't believe that can be done without passing L2 info across the internet. I don't think the bi-directional NAT can be processed successfully for the VPN tunnel.
Do you already have VPN devices for this? If so, what devices are you currently using? I suggest using SLL connection to connect your branch office to your main office. You can look at Cisco ASA 5500-X series for this project. This will also provide you next generation firewall services and other security features.
Usually no news means good news in security, but how do you know what is working, what could be better and where you should invest? Introducing the Cisco Security Outcomes Study.
We commissioned an independent survey of 4,800 active security a...
Cisco is happy to announce their Fall release, FTD 6.7/ASA 9.15.1/FXOS 2.9, which consists of 104 features across 24 initiatives, addressing technical debt while staying true to our five core investment areas: Ease of Use and Deployment, Unified Policy an...
Hi Team, I have one exclusion provided by internal team which is Is it right way to exclude ? *\Program Files\XYZ\* , as per Cisco Docs i see its not recommended because it will create performance issue when we use * at starting , So...
Central Log Management using Cisco Security Analytics and Logging, December 2nd at 8am-9:30am PT
Cisco Security Analytics and Logging is Cisco’s Central Log Management solution for Network Operations and Security Outcomes. It is delivered both as a c...