Yes, you will also need the NAT0 configurations on each device.
Notice that the Site B will now have 2 L2L VPN connections connected to it. So traffic will be entering and leaving its "outside" interface. If we are talking about ASAs then you will need to enable "same-security-traffic permit intra-interface" unless you have already done so. This will enable the traffic to enter and leave the same interface on the ASA. Wihtout it, its not possible.
On the Site B the NAT0 configuration related to Site A to Site C traffic needs to be configured on the "outside" interface.
So for example
access-list OUTSIDE-NAT0 remark NAT0 for Site A to Site C traffic
access-list OUTSIDE-NAT0 permit ip 192.168.0.0 255.255.255.0 192.168.2.0 255.255.255.0
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...