I have a situation I am working on where we are temporarily located in a partner's office and need to build a VPN tunnel back to our corporate office. The problem is that we are both using the same 10.x network range for our respective networks.
Is there a way that I can use 192.168.x.x on the private side of our router which connects to the partners network but have the VPN traffic appear as if it is coming from say 10.150.x.x/16 ? If so, can you provide an example of what I need to do on the router side where I would need to have these commands ?
That might help the secondary issue we are trying to work through which is to have one tunnel between our router and corporate instead of the individual client vpn tunnels that we now have. Our users in that building also need to print to local printers that are on the partners network and are using the 10.x range as we are.
From what you replied, I gather that what I want to do is possible. Still a little confused on how to get it done.
I forgot to put this in the initial message that the VPN router is already doing split tunneling, so I have to figure out how to get the this new nat command to work without messing up what the original one is doing.
Looks like I have heading back to the Cisco docs one more time.
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...