Solved

two networks to talk to each other

Posted on 2016-07-25
9
43 Views
Last Modified: 2016-08-05
network 202.123.123.123 with subnet 192.168.1.x   to talk to network 202.122.122.122. with subnet 192.168.2.x

routers are asa5506 & sonicwall

i want to make sure devices in 192.168.1.x  can access devices on 192.168.2.x   viseversa.

please advise the simplest way...

thank you,

mwauki
0
Comment
Question by:mwauki
9 Comments
 
LVL 22

Expert Comment

by:David Atkin
Comment Utility
Use a VPN
1
 
LVL 9

Expert Comment

by:Cheever000
Comment Utility
Site to site VPN, cross vendor isn't difficult.
1
 

Author Comment

by:mwauki
Comment Utility
thanks guys, i'm in a sutuation here the option is to do static route?  any advise or how to?
0
 

Author Comment

by:mwauki
Comment Utility
what ive done so far is:  between the two routers, i have a pnp network switch and on each pc or pc that needs to go accross i've done a persistent route where:
on 192.168.1.x
Network Address          Netmask  Gateway Address  Metric
        0.0.0.0          0.0.0.0   192.168.200.79  Default
        0.0.0.0          0.0.0.0      192.168.1.1  Default
    192.168.1.1  255.255.255.255      192.168.2.1       1
    192.168.2.1  255.255.255.255      192.168.1.1       1
--------------
192.168.2.x

192.168.2.1  255.255.255.255  192.168.1.1      1
0.0.0.0   0.0.0.0                             192.168.2.1   default
192.168.1.1   255.255.255.255    192.168.2.1 1
192.168.2.1   255.255.255.255   192.168.2.1 1
0
How your wiki can always stay up-to-date

Quip doubles as a “living” wiki and a project management tool that evolves with your organization. As you finish projects in Quip, the work remains, easily accessible to all team members, new and old.
- Increase transparency
- Onboard new hires faster
- Access from mobile/offline

 
LVL 18

Expert Comment

by:Akinsd
Comment Utility
Your routes need to be configured on the firewalls
You didn't specify the subnet mask for each but I'll assume they're both /24
I'll assume the ASA is 202.123.123.123 wile the Sonicwall is202.123.123.122
I'll assume also that the asa and sonicwall can ping each other

On the asa
ip route 192.168.2.0 255.255.255.0 202.122.122.122

On sonicwall (not sure the exact command for sonicwalls but the concept is the same)
ip route 192.168.1.0 255.255.255.0 202.122.122.123
1
 

Author Comment

by:mwauki
Comment Utility
awsomely sounds there, Akinsd!  let me give it  a shut and see how it goes!
0
 
LVL 9

Expert Comment

by:Ian Arakel
Comment Utility
Hi there,

Is the communication happening over the internet?

Static routes along with site to site VPN configuration would be the best recommended way to securely communicate from one site to another.

The below link will guide you through the procedure of setting this UP:
http://www.ponjavic.com/wordpress/2013/11/18/site-to-site-vpn-between-a-sonicwall-firewall-and-cisco-asa-5505/
1
 

Accepted Solution

by:
mwauki earned 0 total points
Comment Utility
thanks all for your help!  

the method that works for me is:  using a straight thru cable plugged into each router's switch ports and configuring one router as static and the other as dynamic and using the a an ip from the static router as a gateway on any workstations under the dynamic router... now am able to talk to each workstations on both networks.
0
 

Author Closing Comment

by:mwauki
Comment Utility
all other comments are good just that the solution i have is a lot lot simmpler...
0

Featured Post

Highfive + Dolby Voice = No More Audio Complaints!

Poor audio quality is one of the top reasons people don’t use video conferencing. Get the crispest, clearest audio powered by Dolby Voice in every meeting. Highfive and Dolby Voice deliver the best video conferencing and audio experience for every meeting and every room.

Join & Write a Comment

Even if you have implemented a Mobile Device Management solution company wide, it is a good idea to make sure you are taking into account all of the major risks to your electronic protected health information (ePHI).
Join Greg Farro and Ethan Banks from Packet Pushers (http://packetpushers.net/podcast/podcasts/pq-show-93-smart-network-monitoring-paessler-sponsored/) and Greg Ross from Paessler (https://www.paessler.com/prtg) for a discussion about smart network …
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

6 Experts available now in Live!

Get 1:1 Help Now