Cisco ASA 5505 Remote VPN IPsec - Same IP as the internal network

First, let me refer to my earlier topic:

My new question is this:
Would it be possible to make the Remote VPN user have an IP address within the same network as the inside network?
If not, is it possible to make all remote VPN users to look like an host within the inside network?

Say that the Remote VPN IP is within
And the internal network is within
Would it then be possible in any way to make this remove VPN user to look like an IP within the internal network?

My situation is this: I have a remote user, that wish to access an internal host, this host ONLY accepts traffic from other hosts within the same network.

Thanks in advace!
Who is Participating?

[Product update] Infrastructure Analysis Tool is now available with Business Accounts.Learn More

I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

Jan SpringerCommented:
Have you tried changing the netmask on this [specific] host to  That would include the and networks.

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
trondbotnenAuthor Commented:
Hit me if I’m wrong, but I believe that this would not work?
My reason is this:
1.      I send a package from my remote computer, lets say, this package is meant for the IP address This would be solved by the VPN client, and the routing that follows.
2.      The package would then travel to the Cisco ASA, where it would be routed to the specific client. Everything fine so far.
3.      Now, this computer (or PLS I’m my case) will try to deliver this package back. And it sees that the IP is within his own network area. This is because of the network mask.
My conclusion is then, the package would never leave the local area, sins the host would never try to send this package to the router.

Or am I totally wrong?
Jan SpringerCommented:
I'm not sure but if the gateway for that host is the ASA, the ASA should know what to do with it.   You might have to configure the ASA to proxy ARP that IP so that when the host issues an ARP who has, the ASA can answer up with its IP.

So, no.  You're not totally wrong.  But this may be the only way you can get the remote to talk with the local host.
Managing Security Policy in a Changing Environment

The enterprise network environment is evolving rapidly as companies extend their physical data centers to embrace cloud computing and software-defined networking. This new reality means that the challenge of managing the security policy is much more dynamic and complex.

The answer to the question is yes you can allocate the IP Pool for the VPN user out of the subnet that's on the inside interface.  The ASA will automatically proxy arp, and the traffic will work correctly.  You just need to ensure that your IP Pool doesn't overlap any other IP assignments on the inside network.

trondbotnenAuthor Commented:
A reply to both of you:

Isn’t it so, that a host will never send a package to the gateway(Cisco ASA) as long as the host is within the network specified on that host? - would not send packages to gateway, as long as they are between –

Or is this wrong?
Jan SpringerCommented:
Whichever device answers the ARP 'who has' is the device to which the packet is sent.  So, if the ASA is proxy-arping for an IP, it will response to the 'who has' request with its own IP.

The gateway (default route) is used for layer 3 packet transfers when no other route is known for another subnet.

So, I expect that packets from host to host within a subnet will utilize ARP 'who has' and will not forward the packet to the gateway unless the gateway performs a proxy arp (which I why I disable proxy arp by default where possible).
trondbotnenAuthor Commented:
I dont seems to fully understand this Proxy-arp that you speak of, but I will read up on it, and come back WHEN i have anohter question :P

Still, feel free to post other known solutions that you think might solv my problem!

Thanks so far !
Just to clarify.

In a LAN, when a device wants to send to another device, the sending device needs to know the MAC address of the destination device, so it sends an ARP request which is like saying " I need the MAC address of the device with this IP address x.x.x.x." The device that has that IP address then responds and says "I have IP address x.x.x.x and this is my MAC address abcd.efgh.ijkl" The sending device can now use that MAC address to send data to the destination.

What happens with proxy ARP is that another device such as the ASA acts as a proxy between the source and destination. So when the source sends the ARP request asking for the MAC address of a destination, the ASA will respond with its own MAC address as if it were the destination. The source then sends data to the ASA and the ASA sends that data onto the destination. For this to work, proxy ARP must be enabled , and the ASA must have a way to get to the destination.

Hope that helps.

Peter C.
trondbotnenAuthor Commented:
Hum, i think that i now understand a litte more.

But now, it still seems to me like the PLS (network host) will still not respond to hostes outside its network?

Or am I still on a wild track here?
trondbotnenAuthor Commented:
I might add that Proxy ARP is already enabled for this Cisco ASA : /

Took a quick look as I was waiting for the night, and sleepiness to come along.

But now I think that I would have to add, that I can in fact access an Windows machine within the internal network, but the PLS is unreachable to me.
Jan SpringerCommented:
There might be an access list configured on that host that prevents outside networks from connecting.

The only other consideration is that it is missing a default route ( gateway).
trondbotnenAuthor Commented:
Then I’m back to my other solution, that I would like if all remote hosts got an “fake” internal address. So that the insidehost(pls) would think that the package would be delivered to the an inside host.

But this isn’t possible?  Or would it by any chance be?
trondbotnenAuthor Commented:
Then it was time to hand out some points.
I found the solution to the problem, and it was probably almost exactly like Jepsen said in the beginning.

I configured as follows:

Inside networks:
IPsec VPN Pool:
With its NAT rules.

This worked perfectly!

The problem was that the PLC had no opportunity to configure a gateway.

Sorry I did not understand what you all thought, as it had saved us all a lot of bother.
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today

From novice to tech pro — start learning today.