05-04-2018 05:30 AM - edited 03-12-2019 05:15 AM
Does anyone know how to create two Site-to-Site VPN Tunnels on the Cisco ASA with the same local subnet on the remote end?
For example, I have these:
Tunnel 1 - Built and working already
Site A Site B
10.1.1.0/24 172.2.0.0/16
Tunnel 2 - New and Needs to be Built - Falls within the same subnet as B but a /24
10.1.1.0/24 172.2.2.0/24
Phase 1 works fine but we don't see any packets on Phase 2 because it will go over the first tunnel. I tried moving the crypto map for Tunnel 2 before Tunnel 1 and clearing the session but it gets rebuilt instantaneously because the are some background traffic between the two sites that generates traffic.
Does anyone have any suggestion this?
thank you!
05-04-2018 05:40 AM
Since the current Tunnel 2 has a smaller range (/24), this should be placed above the existing tunnel to the /16. What this will do is allow any traffic to 172.2.2.0/24 go through the new tunnel and everything in 172.2.0.0/16 except for the 172.2.2.0/24 go through the existing one. So if you have ip addresses in the 172.2.2.0/24 range for the existing tunnel, this would be a conflict. The only way around that would be to translate the traffic to another non-conflicting subnet.
05-04-2018 05:46 AM
Hi Rahul,
Thank you for the quick reply.
I have tried creating a source nat for tunnel B that says when site a wants to talk to remote end, translate to IP X.X.X.X and my access-list is X.X.X.X with 172.2.2.0/24. However, this still doesn't work as when I ran a ping test from Site A, I can see the ping test going over Site 1's tunnel.
It seems the test traffic is passing through Tunnel One before NAT gets checked (the reason I changed the crypto map priority to test but that didn't make any difference).
Should this be a destination NAT? How should the NAT look like?
Thank you!
thank you!
Paula
05-04-2018 05:52 AM
So there a few ways to do the NAT. If you do source NAT to x.x.x.x, then the ACL would be x.x.x.x to 172.2.2.0/24 (reverse at the other end). You have to remember to place the NAT rule above the NAT exemption rule (no NAT) that you have for Tunnel1.
You could also do destination NAT, but again, your NAT rule should be above the exemption rule.
If you don't have conflicting ip addresses, I do not see why changing the order of the tunnel's wont work. Can you paste a snippet of your NAT and crypto ACL config?
05-04-2018 06:19 AM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide