Pinging all network admins:
This seems so obvious to me, that I’m kinda scratching my head, wondering what I’m missing.
Here’s the deal.
I’m trying to configure a site-to-site VPN with Partner X.
My network: 200.200.200.0/24
My FW/VPN device: 200.200.200.1
Partner X’s FW/VPN device: 100.100.100.1
Partner X is presumably NATing everything behing that firewall. Assuming we’ve got the configurations matched up, everything’s copacetic, right?
Wrong.
Partner X is telling me that if the VPN is configured correctly, I should be able to ping one of their hosts in the 10.0.0.0/24 range.
Come again?
Yeah. 10.0.0.0/24.
Now, I’m kinda new to this, but looks suspiciously like a reserved address. I suppose I could set up a static route, but that leads me to a couple of GQs, and one IMHO:
[ul]
[li]Is there any standard site-to-site VPN configuration where that makes sense?[/li][li]Doesn’t that completely break RFC 1918?[/li][li]Routing issues aside, isn’t it a big, fat, security exposure?[/li][li]Assuming my instincts about all of this are right, what’s the best way to tell a fellow firewall admin that he’s, uh, completely and totally off base?[/li][/ul]
I’m totally prepared to be told that I don’t know what I’m talking about, here. I’ve only done maybe sixty of these configs, and I’ve only really got experience with PIXes and Checkpoint boxes; Partner X is on a completely different platform.
Anybody care to straighten me out?
Thanks.
PS: All addresses were changed to protect the guilty, natch.