Solved

Network Routing Over a VPN

Posted on 2008-09-30
4
265 Views
Last Modified: 2012-05-05
I have got 2 seperate networks in 2 different locations.

I have got a VPN tunnel up and running between our 2 offices.

Both the networks are using the same IP subnet range even though they are in 2 different locations and we had traffic routing between the 2. At one point we had traffic going up but not coming down.

Is there anything that could be causing this?

Could it be because of the 2 differet offices are on the same subnet? I have someone say to me its because of network shadowing. Has anyone heard of this term?
0
Comment
Question by:hmuser
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 4

Accepted Solution

by:
mattbcs earned 125 total points
ID: 22607757
You will need to use two different subnets due to the vpn routing situation (one /24 for each location) otherwise the path to each office is ambiguious and you are unable to make a route statement using the same subnet.

Cheers,
Matt
0
 
LVL 24

Expert Comment

by:ryansoto
ID: 22607824
Matt is 100% right need different subnets for each network
0
 
LVL 1

Author Comment

by:hmuser
ID: 22608010
Have you heard of IP shadowing?

The strange thing is that it used to work the way we set it up until another guy messed around
0
 
LVL 4

Expert Comment

by:mattbcs
ID: 22608198
Not off the top of my head... what cisco gear are you using?
0

Featured Post

IoT Devices - Fast, Cheap or Secure…Pick Two

The IoT market is growing at a rapid pace and manufacturers are under pressure to quickly provide new products. Can you be sure that your devices do what they're supposed to do, while still being secure?

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Short answer to this question: there is no effective WiFi manager in iOS devices as seen in Windows WiFi or Macbook OSx WiFi management, but this article will try and provide some amicable solutions to better suite your needs.
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…
Suggested Courses
Course of the Month10 days, 13 hours left to enroll

632 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question