05/13/2020 1,397 People found this article helpful 465,011 Views
Global VPN Client enables remote users to connect to the corporate network using a secure VPN tunnel. Sometimes one or more remote users' physical network may be in the same subnet as the corporate network being accessed. In such cases the user will not able to access the corporate network.
This article describes one of various methods to work around this problem. The solution provided here is to configure a virtual subnet with identical subnet mask as the corporate (physical) network, which would do a one to one mapping of the virtual IP addresses to the corporate (physical) network.
For the purpose of this article we’ll be using the following IP addresses as examples. You can substitute your IP addresses for the examples shown here:
The following steps are required to successfully connect a GVC client PC to the network behind the SonicWall when both the client PC and the SonicWall network are overlapping:
TIP: To create a more granular control you can define the Source Network which could be "VPN DHCP Clients" or you can create a custom object for the Source Network (in this case source network will match destination network).
How to Test:
When GVC users with overlapping networks try to access a network resource in the corporate network, the above NAT policy will translate the destination IP address to the corresponding address in the corporate network. For instance, a server in the corporate network with an IP address of 192.168.168.2 has to be accessed by GVC users using the IP address 10.10.10.2. Please note that this is only applicable to GVC users with overlapping networks. Normal users should access the corporate network by using the physical ip address of 192.168.168.2.