I have 2 isolated networks, the 1st is 10.x.x.x and the 2nd is 192.168.x.x. I have a point to point connection between each network. I have multi-interface routers at each end. On the 192.168 side I have one interface assigned a 192.168.68.x address and a 2nd interface assigned a 10.7.1.x address. On the 10.x.x.x side I have a router with 3 interfaces. the 1st is a 10.7.1.x, the 2nd is 10.2.x.x and the 3rd is 10.3.x.x.
With this current configuration in place I have access to all 10.2 and 10.3 devices on my remote network from the 192.168.x.x network. At this juncture I am unable to directly attach and administer devices that lye on the 10.1.x.x, 10.4.x.x, 10.5.x.x and 10.6.x.x networks. However I am able to backdoor into these devices through my 10.2.x.x interface on my firewall at the remote location which provides all the routing required between all the 10.x.x.x networks. This is not an efficient method when it comes to monitoring, backing configs and general administration of these devices.
I have tried modifying the configs that are in place to allow the 192.168.x.x traffic to pass through to all of the 10.x.x.x traffic but have been unsuccessful. I cannot seem to get past my 10.7.x.x interface on the remote router when I attempt to connect to any network other than 10.2 and 3. Its obvious as to why I can get to devices on the 10.2 & 3 networks (because of the other 2 physical interfaces on the remote router). The question is: Do I need to add more interfaces ex. 10.1.x.x, 10.4.x.x, 10.5.x.x, 10.6.x.x to the remote router to gain access to those subnets from my 192.168.0.0 network. I know that creating virtual interfaces is an option, the problem here is the VLANs in place and the physical connections to the ports that lye on these VLANs.
Can you reach the 10.1.X.X, 10.4.X.X - 10.5.X.X subnets from the router with the 10.2.1.X and 10.3.1.X interfaces? If yes, are there routes on the end devices (10.1.X.X, 10.4.X.X, 10.5.X.X) back to the 192.168.X.X subnets?
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...