Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations Mike Lewis on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

FastEthernet0/1 overlaps w/ FastEthernet0/0

Status
Not open for further replies.

notShai

IS-IT--Management
May 16, 2006
35
US
Router 1: new T1 and new router (from T1 on a 3630 to 3megT1 on a 1841).

router 1 has a VPN going to router 2 (different T1 different location).

the VPN is of the type that enables one local network ping the other local network and in reverse too (IPSEC w GRE?).

the VPN source IP was using the SERIAL IP address on the SERIAL interface on router 1.
-i wanted to change that and use one of the IP's from the large block we have (what do you call these IP's which arent the serial?)
so i am trying to add one of those non serial IP's to FastEthernet0/1 and map the VPN through that interface.
but it says" xxx.xxx.123.0 overlaps with FastEthernet0/0" where the first IP on that block is xxx.xxx.123.1

is there a way to exclude one ip from that block which is assigned to FastEthernet0/0 ?

is there a down side to using the serial IP? i assume the better way to assign the VPN IP is using one of the block IP's and not serial, am i wrong?

thank you.


crypto map vpn 10 ipsec-isakmp
set peer 10.10.10.2
set transform-set s1s2
match address 108
!
!
!
interface Tunnel0
ip address 10.10.10.1 255.255.255.0
tunnel source xxx.xxx.123.78
tunnel destination xxx.xxx.456.122
crypto map vpn
!
interface MFR1
mtu 4470
no ip address
no ip redirects
no ip proxy-arp
encapsulation frame-relay IETF
no ip mroute-cache
load-interval 30
no arp frame-relay
frame-relay multilink bid to gw
frame-relay lmi-type ansi
!
interface MFR1.500 point-to-point
ip address yyy.yyy.123.202 255.255.255.252
no ip redirects
no ip proxy-arp
ip nat outside
ip virtual-reassembly
no cdp enable
no arp frame-relay
frame-relay interface-dlci 500 IETF
!
interface FastEthernet0/0
ip address 172.16.1.2 255.255.248.0 secondary
ip address xxx.xxx.123.1 255.255.255.0
no ip redirects
ip virtual-reassembly
duplex auto
speed auto
no mop enabled
crypto map vpn
!
interface FastEthernet0/1
no ip address
shutdown
duplex auto
speed auto
!
interface Serial0/0/0:0
mtu 4470
bandwidth 1536
no ip address
no ip redirects
no ip proxy-arp
encapsulation frame-relay MFR1
no arp frame-relay
!
interface Serial0/0/1:0
mtu 4470
bandwidth 1536
no ip address
no ip redirects
no ip proxy-arp
encapsulation frame-relay MFR1
no arp frame-relay
!
router eigrp 100
network 10.10.10.0 0.0.0.255
network 10.10.12.0 0.0.0.255
network 172.16.0.0 0.0.7.255
no auto-summary
no eigrp log-neighbor-changes
!
ip forward-protocol nd
ip route 0.0.0.0 0.0.0.0 MFR1.500
ip route 192.168.25.0 255.255.255.0 10.10.12.2
!
!
no ip http server
no ip http secure-server
ip nat pool ovrld xxx.xxx.123.1 xxx.xxx.123.1 netmask 255.255.255.0
ip nat pool swimpool xxx.xxx.123.2 xxx.xxx.123.254 prefix-length 24
ip nat inside source list 120 pool swimpool overload
ip nat inside source route-map nonat interface MFR1.500 overload
!
access-list 7 permit 172.16.0.0 0.0.255.255
access-list 100 permit tcp 172.16.0.0 0.0.255.255 any
access-list 100 permit ip 172.16.0.0 0.0.7.255 any
access-list 100 permit ip 172.16.0.0 0.0.0.255 any
access-list 101 permit icmp any any echo
access-list 101 permit icmp any any echo-reply
access-list 101 permit icmp any any unreachable
access-list 101 permit icmp any any time-exceeded
access-list 101 permit tcp any any established
access-list 101 permit tcp any any eq telnet
access-list 101 permit gre any any
access-list 101 permit esp any any
access-list 101 permit ahp any any
access-list 101 permit udp any any eq isakmp
access-list 101 permit udp any any eq non500-isakmp
access-list 101 permit udp any eq domain any
access-list 101 permit udp any eq isakmp any eq isakmp
access-list 101 permit tcp 192.168.1.0 0.0.0.255 any eq 135
access-list 101 permit udp 192.168.1.0 0.0.0.255 any eq 135
access-list 101 permit tcp 192.168.1.0 0.0.0.255 any eq 138
access-list 101 permit udp 192.168.1.0 0.0.0.255 any eq netbios-dgm
access-list 101 permit tcp 192.168.1.0 0.0.0.255 any eq 139
access-list 101 permit udp 192.168.1.0 0.0.0.255 any eq netbios-ss
access-list 108 permit ip 172.16.0.0 0.0.7.255 192.168.1.0 0.0.0.255
access-list 109 deny ip host 172.16.172.249 any
access-list 109 deny ip 172.16.0.0 0.0.7.255 192.168.1.0 0.0.0.255
access-list 120 deny ip host 172.16.1.2 any
access-list 120 deny ip 172.16.0.0 0.0.7.255 192.168.1.0 0.0.0.255
access-list 120 permit ip 172.16.0.0 0.0.7.255 any
disable-eadi
!
route-map nonat permit 10
match ip address 7
!
!
!
control-plane
!
!
!
line con 0
exec-timeout 20 0
line aux 0
line vty 0 4
!
scheduler allocate 20000 1000
end
 
That is because you can't have two different physical interfaces on the same router in the same subnet, but if you control the whole /24, you could subnet it into different subnets.
 
i tried applying the VPN to the serial interface and got nada.

so i removed the vpn code and connected the old T1/router back into the network (after cleaning it up).
the old T1 line/router can now ping router 2 locally, and can ping the new router locally (can access bot nets) but the two networks cant see each other. the old T1 is the only device that can see both networks.
 
Status
Not open for further replies.

Part and Inventory Search

Sponsor

Back
Top