- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
05-16-2025 06:24 AM - edited 05-16-2025 09:34 AM
Hello Team,
We want to use the same subnet used in the office(on which S2S VPN is configured) to be configured for Global Protect VPN so that users will be able to access the S2S VPN tools.
For ex:- Office subnet- 172.21.0.0/16
S2S VPN Subnet- 172.21.10.0/24
Global Protect VPN-172.21.10.100-172.21.10.200
Kindly suggest regarding the possibilities.
05-20-2025 05:16 PM
Hi @PA_User10 ,
I would recommend to use non-overlapping IP pools for your S2S,GlobalProtect client pool, and office. If you need to stay within the 172.21.0.0/16 range, you can break up the /16 as follows:
Office Subnet: 172.16.0.0/23
GlobalProtect client pool: 172.16.10.0/24
S2S Subnet: 172.16.20.0/24
This keeps your design within your 172.16.0.0/16 block while giving you dedicated subnets for each function.
05-22-2025 01:22 AM
This is perfectly possible but does come with a bunch of caveats
you'll need to have the tunnel interface in the trust zone so the ip pool can be part of the same broadcast domain as the physical network (the firewall will take care of that if the interface is in the same zone)
your on-prem DHCP (firewall or AD typically) will need to have a blank reservation for the entire IP pool so it does not assign those IPs
alternatively: have you considered source NAT ?
That way you can have the ip pool be a non-verlapping subnet, put the tunnel interface in a different zone, and simply source-NAT outbound S2S connections behind an office IP
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!