{"id":1730,"date":"2022-08-29T16:15:47","date_gmt":"2022-08-29T15:15:47","guid":{"rendered":"https:\/\/vminded.com\/?p=1730"},"modified":"2022-08-29T16:15:49","modified_gmt":"2022-08-29T15:15:49","slug":"how-to-leverage-nated-t1-gateway-for-overlapping-networks-over-a-route-based-vpn-to-a-tgw","status":"publish","type":"post","link":"https:\/\/vminded.com\/index.php\/2022\/08\/29\/how-to-leverage-nated-t1-gateway-for-overlapping-networks-over-a-route-based-vpn-to-a-tgw\/","title":{"rendered":"How to leverage NATed T1 Gateway for overlapping networks over a Route Based VPN to a TGW"},"content":{"rendered":"\n<p>I have seen a lot of customers having overlapping IP subnets among their applications and who wanted to avoid renumbering their network segments  when they migrate them to the cloud.<\/p>\n\n\n\n<p>In the recent <strong><a href=\"https:\/\/docs.vmware.com\/en\/VMware-Cloud-on-AWS\/0\/rn\/vmc-on-aws-relnotes.html#whats-new-april5-2022sddc-version-118-19\" target=\"_blank\" rel=\"noreferrer noopener\">1.18 release<\/a><\/strong> of VMware Cloud on AWS, we have added the ability for customers to create <a href=\"https:\/\/docs.vmware.com\/en\/VMware-Cloud-on-AWS\/services\/com.vmware.vmc-aws-networking-security\/GUID-4DD7CA8F-E0C1-4715-899A-BD71ABAF125E.html\" target=\"_blank\" rel=\"noreferrer noopener\">additional T1 Compute Gateways<\/a> . Additional T1s can be used for a number of use cases including environment segmentation, multi-tenancy and <strong>overlapping IP addresses<\/strong>.<\/p>\n\n\n\n<p>In this blog post, I am going to cover the specific design case where a native <strong><a href=\"https:\/\/aws.amazon.com\/vpc\/\" target=\"_blank\" rel=\"noreferrer noopener\">VPC<\/a><\/strong> needs to connect with a segment in an SDDC that has an overlapping subnet with another segment. The SDDC itself is using a <strong><a href=\"https:\/\/docs.vmware.com\/en\/VMware-Cloud-on-AWS\/services\/com.vmware.vmc-aws-networking-security\/GUID-5AF45CE6-FA53-45C0-83E5-25F8E3A055E9.html\" target=\"_blank\" rel=\"noreferrer noopener\">Route Based VPN<\/a><\/strong> to connect to a native <strong><a href=\"https:\/\/aws.amazon.com\/fr\/transit-gateway\/?whats-new-cards.sort-by=item.additionalFields.postDateTime&amp;whats-new-cards.sort-order=desc\" target=\"_blank\" rel=\"noreferrer noopener\">AWS Transit Gateway<\/a><\/strong> where the native VPC is peered.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-lab-topology\">Lab topology<\/h2>\n\n\n\n<p>First of all, I have deployed my SDDC in the Northern Virginia region. Straightaway I have attached it to a native Transit GW over a <strong><a href=\"https:\/\/docs.vmware.com\/en\/VMware-Cloud-on-AWS\/services\/com.vmware.vmc-aws-networking-security\/GUID-5AF45CE6-FA53-45C0-83E5-25F8E3A055E9.html\" target=\"_blank\" rel=\"noreferrer noopener\">Route Based VPN<\/a><\/strong> (I wanted to leverage BGP for dynamic routes exchange).<\/p>\n\n\n\n<p>I then have attached the native VPC  to the native TGW through a normal peering connectivity.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"547\" src=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-29-at-16.19.58-1024x547.png\" alt=\"\" class=\"wp-image-1817\" srcset=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-29-at-16.19.58-1024x547.png 1024w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-29-at-16.19.58-300x160.png 300w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-29-at-16.19.58-768x410.png 768w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-29-at-16.19.58-1536x821.png 1536w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-29-at-16.19.58-1200x641.png 1200w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-29-at-16.19.58.png 1886w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/figure>\n\n\n\n<p>N.B.: I took the assumption that I would need a <a href=\"https:\/\/docs.vmware.com\/en\/VMware-Cloud-on-AWS\/services\/com.vmware.vmc-aws-operations\/GUID-D69BF739-2ACB-4E8D-B1A9-6F0224191B6B.html\" target=\"_blank\" rel=\"noreferrer noopener\">route aggregation<\/a><strong>\u00a0<\/strong>for route advertisement<strong>\u00a0<\/strong>as it&#8217;s a requirement for the Multiple Compute Gateway case. A key point in that case is that it&#8217;s not using Transit Connect, Direct Connect, or Connected VPC, so I don&#8217;t need a route aggregation.<\/p>\n\n\n\n<p>Additionally in this <strong>SDDC, <\/strong>I have created two<strong> <a href=\"https:\/\/docs.vmware.com\/en\/VMware-Cloud-on-AWS\/services\/com.vmware.vmc-aws-networking-security\/GUID-267DEADB-BD01-46B7-82D5-B9AA210CA9EE.html\" target=\"_blank\" rel=\"noreferrer noopener\">Compute segments<\/a> <\/strong>that<strong> <\/strong>are using <strong>overlapping IPs<\/strong>  (172.20.2.0\/24).<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-29-at-16.12.58.png\" alt=\"\" class=\"wp-image-1813\" width=\"511\" height=\"359\" srcset=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-29-at-16.12.58.png 796w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-29-at-16.12.58-300x211.png 300w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-29-at-16.12.58-768x540.png 768w\" sizes=\"auto, (max-width: 511px) 85vw, 511px\" \/><\/figure>\n\n\n\n<p>On the AWS native side, there is 1\u00a0<strong><a href=\"https:\/\/aws.amazon.com\/ec2\/instance-types\/\" target=\"_blank\" rel=\"noreferrer noopener\">EC2<\/a><\/strong>\u00a0instances (172.20.5.153) in a native VPC (<em><strong>172.20.5.0\/24<\/strong><\/em>) and on the SDDC I have deployed a Debian10 Virtual Machine named\u00a0<em>Deb10-app001 r<\/em>unning with IP\u00a0<strong>172.20.2.100<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"369\" src=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-29-at-16.14.35-1024x369.png\" alt=\"\" class=\"wp-image-1815\" srcset=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-29-at-16.14.35-1024x369.png 1024w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-29-at-16.14.35-300x108.png 300w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-29-at-16.14.35-768x277.png 768w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-29-at-16.14.35-1536x553.png 1536w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-29-at-16.14.35-2048x738.png 2048w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-29-at-16.14.35-1200x432.png 1200w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>Inside the SDDC, I have attached the VM to the Overlapped segment as you can see it here:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-11-at-16.53.43-954x1024.png\" alt=\"\" class=\"wp-image-1739\" width=\"430\" height=\"461\" srcset=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-11-at-16.53.43-954x1024.png 954w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-11-at-16.53.43-280x300.png 280w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-11-at-16.53.43-768x824.png 768w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-11-at-16.53.43.png 1066w\" sizes=\"auto, (max-width: 430px) 85vw, 430px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Implementing the lab topology<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Creating the New CGW<\/h3>\n\n\n\n<p>There are three different types of <a href=\"https:\/\/docs.vmware.com\/en\/VMware-Cloud-on-AWS\/services\/com.vmware.vmc-aws-networking-security\/GUID-4DD7CA8F-E0C1-4715-899A-BD71ABAF125E.html\" target=\"_blank\" rel=\"noreferrer noopener\">Tier-1 Compute Gateway<\/a>s that can be added with M16: <em>Routed<\/em>, <em>Isolated<\/em> and <em>NATed<\/em>. In this example, I have chosen the <strong>NATed type<\/strong>. This CGW type allows for communication between segments but avoid that any segments to be learned by the Tier-0 router. This also avoid having their CIDRs show up in the routing table.<\/p>\n\n\n\n<p>To create the new NATed CGW, I went to the <strong>Tier1-Gateways<\/strong> menu and click on the &#8220;ADD TIER-1 GATEWAY&#8221; button. In addition, I have made sure I pick <strong>NATed<\/strong> as the type.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"362\" src=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-11-at-16.58.44-1024x362.png\" alt=\"\" class=\"wp-image-1741\" srcset=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-11-at-16.58.44-1024x362.png 1024w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-11-at-16.58.44-300x106.png 300w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-11-at-16.58.44-768x271.png 768w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-11-at-16.58.44-1536x543.png 1536w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-11-at-16.58.44-2048x723.png 2048w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-11-at-16.58.44-1200x424.png 1200w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>I know have a new Tier-1 Compute Gateway.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Creating a new overlapping segment<\/h3>\n\n\n\n<p>Equally, I have created the overlapped segment and have attached it to the new NATed CGW Compute Gateways. I have picked the &#8216;T1 NATed&#8217; CGW in the list.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"609\" src=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-11-at-17.09.38-1024x609.png\" alt=\"\" class=\"wp-image-1748\" srcset=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-11-at-17.09.38-1024x609.png 1024w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-11-at-17.09.38-300x178.png 300w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-11-at-17.09.38-768x457.png 768w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-11-at-17.09.38-1536x914.png 1536w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-11-at-17.09.38-1200x714.png 1200w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-11-at-17.09.38.png 1856w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Creating a DNAT Rule<\/h3>\n\n\n\n<p>In order to ensure connectivity to the SDDC\u2019s overlay segments configured behind them we need to configure a NAT Rule on the <strong>NATed<\/strong>\u00a0<strong>CGWs<\/strong>.\u00a0<\/p>\n\n\n\n<p>So the last step was to create a <strong><a href=\"https:\/\/docs.vmware.com\/en\/VMware-NSX-T-Data-Center\/3.2\/administration\/GUID-0B572AF0-8AAE-4C4E-83A6-A7DEF4CF5DCD.html\" target=\"_blank\" rel=\"noreferrer noopener\">DNAT Rule<\/a><\/strong> and attach it to the T1 NATed Compute Gateway.<\/p>\n\n\n\n<p>For that I went to the NAT Menu on the left and have selected the Tier-1 Gateway tab and pick the T1 NATed GW.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"505\" src=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-11-at-17.36.14-1024x505.png\" alt=\"\" class=\"wp-image-1752\" srcset=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-11-at-17.36.14-1024x505.png 1024w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-11-at-17.36.14-300x148.png 300w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-11-at-17.36.14-768x379.png 768w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-11-at-17.36.14-1200x592.png 1200w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-11-at-17.36.14.png 1294w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/figure>\n\n\n\n<p>I have just clicked on the <strong>ADD NAT RULE<\/strong> button. I have enter the NATed subnet in the destination IP\/Port field (<strong>192.168.3.0\/24<\/strong> in this example) and the overlapped subnet as the destination.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"237\" src=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-11-at-17.43.07-1024x237.png\" alt=\"\" class=\"wp-image-1753\" srcset=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-11-at-17.43.07-1024x237.png 1024w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-11-at-17.43.07-300x69.png 300w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-11-at-17.43.07-768x177.png 768w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-11-at-17.43.07-1536x355.png 1536w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-11-at-17.43.07-1200x277.png 1200w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-11-at-17.43.07.png 1930w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/figure>\n\n\n\n<p>This means that any IP I want to reach inside <strong>172.20.2.0\/24 <\/strong>like <em><strong>172.20.2.100 <\/strong><\/em>will be accessible over the Nated IP <em><strong>192.168.3.100<\/strong><\/em>.<\/p>\n\n\n\n<p>Next step is to click on the <strong>Set<\/strong> to select the right T1 Gateway to apply the rule to and picked the <strong>T1 Nated<\/strong> Gateway:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"993\" src=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-11-at-17.47.06-1024x993.png\" alt=\"\" class=\"wp-image-1754\" srcset=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-11-at-17.47.06-1024x993.png 1024w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-11-at-17.47.06-300x291.png 300w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-11-at-17.47.06-768x745.png 768w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-11-at-17.47.06-1200x1164.png 1200w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-11-at-17.47.06.png 1320w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/figure>\n\n\n\n<p>After a couple of seconds, I have confirmed the rule gets activated by checking the rule status:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"45\" src=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-11-at-17.48.57-1024x45.png\" alt=\"\" class=\"wp-image-1756\" srcset=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-11-at-17.48.57-1024x45.png 1024w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-11-at-17.48.57-300x13.png 300w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-11-at-17.48.57-768x34.png 768w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-11-at-17.48.57-1536x67.png 1536w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-11-at-17.48.57-2048x90.png 2048w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-11-at-17.48.57-1200x52.png 1200w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Adding the right Compute Gateway Firewall rule<\/h3>\n\n\n\n<p>Next thing I did to finish the setup is to add the right firewall rule on the new T1 Gateway. Remember each T1 has its own FW rules.<\/p>\n\n\n\n<p>In this case, I have created a new group called &#8216;My VPC Prefix&#8217;.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-29-at-12.57.20.png\" alt=\"\" class=\"wp-image-1796\" width=\"440\" height=\"560\" srcset=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-29-at-12.57.20.png 664w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-29-at-12.57.20-235x300.png 235w\" sizes=\"auto, (max-width: 440px) 85vw, 440px\" \/><\/figure>\n\n\n\n<p>I have, however, created another group with the CIDRs I used to map the &#8216;Overlapping Segment&#8217;:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-29-at-12.09.54.png\" alt=\"\" class=\"wp-image-1772\" width=\"557\" height=\"604\" srcset=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-29-at-12.09.54.png 938w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-29-at-12.09.54-276x300.png 276w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-29-at-12.09.54-768x834.png 768w\" sizes=\"auto, (max-width: 557px) 85vw, 557px\" \/><figcaption>The segment used in this example is 192.168.3.0\/24. The group reference two CIDRs however<\/figcaption><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>I then have created the Compute Gateway Firewall rule called &#8216;<strong>ToDNAT<\/strong>&#8216; with the group &#8220;<strong>My VPC Prefix<\/strong>&#8221; as the source and the IP address of my NATed segment as the destination with &#8216;SSH&#8217; and &#8216;ICMP ALL&#8217;:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"305\" src=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-29-at-16.54.46-1024x305.png\" alt=\"\" class=\"wp-image-1836\" srcset=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-29-at-16.54.46-1024x305.png 1024w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-29-at-16.54.46-300x89.png 300w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-29-at-16.54.46-768x229.png 768w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-29-at-16.54.46-1536x458.png 1536w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-29-at-16.54.46-2048x610.png 2048w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-29-at-16.54.46-1200x358.png 1200w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><figcaption>Compute Gateway FW rule have to use the NATed CIDR as Destination IP and not the segment ip.<\/figcaption><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Testing the lab topology<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Checking the routing<\/h3>\n\n\n\n<p>First let&#8217;s check the routing inside the VPC. We need to add a static route back to the SDDC NATed segment CIDR: <em><strong>192.168.3.0\/24<\/strong><\/em>. Thanks to that, the VPC will send all traffic destinated to the NATed CIDR over the TGW peering.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"327\" src=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-29-at-12.18.10-1024x327.png\" alt=\"\" class=\"wp-image-1780\" srcset=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-29-at-12.18.10-1024x327.png 1024w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-29-at-12.18.10-300x96.png 300w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-29-at-12.18.10-768x245.png 768w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-29-at-12.18.10-1536x491.png 1536w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-29-at-12.18.10-2048x654.png 2048w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-29-at-12.18.10-1200x383.png 1200w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><figcaption>The route back to the SDDC in the route table of the VPN\/subnet<\/figcaption><\/figure>\n\n\n\n<p>As there is a Route Based VPN between the SDDC and the TGW, the TGW route table is automatically advertising the SDDC NATed CIDR (192.168.3.0\/24) that I will use to connect to the overlapped segment (172.20.2.0\/24).<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"797\" src=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-29-at-17.07.05-1024x797.png\" alt=\"\" class=\"wp-image-1838\" srcset=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-29-at-17.07.05-1024x797.png 1024w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-29-at-17.07.05-300x234.png 300w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-29-at-17.07.05-768x598.png 768w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-29-at-17.07.05-1536x1196.png 1536w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-29-at-17.07.05-1200x934.png 1200w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-29-at-17.07.05.png 2042w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><figcaption>This shows the attached VPC CIDRs and the segment CIDRs. <\/figcaption><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Pinging from the VPC<\/h3>\n\n\n\n<p>To test my lab connectivity, I have connected to the instance created in the AWS native VPC (172.20.5.0\/24) and try to ping the 192.168.3.100 Ip address and it worked!<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"611\" src=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-29-at-12.37.11-1024x611.png\" alt=\"\" class=\"wp-image-1784\" srcset=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-29-at-12.37.11-1024x611.png 1024w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-29-at-12.37.11-300x179.png 300w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-29-at-12.37.11-768x458.png 768w, https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-29-at-12.37.11.png 1026w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>In this blog post I have demonstrated how to connect to an overlapped SDDC segment by creating an additional NATed CGW. In this example, I have connected from a VPC attach to a TGW connected to the SDDC over a VPN .<\/p>\n\n\n\n<p>I hope you enjoyed it!<\/p>\n\n\n\n<p>In my next blog post, I will show you how to do the same over a Transit Connect, stay tune!<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>I have seen a lot of customers having overlapping IP subnets among their applications and who wanted to avoid renumbering their network segments when they migrate them to the cloud. In the recent 1.18 release of VMware Cloud on AWS, we have added the ability for customers to create additional T1 Compute Gateways . Additional &hellip; <a href=\"https:\/\/vminded.com\/index.php\/2022\/08\/29\/how-to-leverage-nated-t1-gateway-for-overlapping-networks-over-a-route-based-vpn-to-a-tgw\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;How to leverage NATed T1 Gateway for overlapping networks over a Route Based VPN to a TGW&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1730","post","type-post","status-publish","format-standard","hentry","category-vmconaws"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to leverage NATed T1 Gateway for overlapping networks over a Route Based VPN to a TGW - vminded.com<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/vminded.com\/index.php\/2022\/08\/29\/how-to-leverage-nated-t1-gateway-for-overlapping-networks-over-a-route-based-vpn-to-a-tgw\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to leverage NATed T1 Gateway for overlapping networks over a Route Based VPN to a TGW - vminded.com\" \/>\n<meta property=\"og:description\" content=\"I have seen a lot of customers having overlapping IP subnets among their applications and who wanted to avoid renumbering their network segments when they migrate them to the cloud. In the recent 1.18 release of VMware Cloud on AWS, we have added the ability for customers to create additional T1 Compute Gateways . Additional &hellip; Continue reading &quot;How to leverage NATed T1 Gateway for overlapping networks over a Route Based VPN to a TGW&quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/vminded.com\/index.php\/2022\/08\/29\/how-to-leverage-nated-t1-gateway-for-overlapping-networks-over-a-route-based-vpn-to-a-tgw\/\" \/>\n<meta property=\"og:site_name\" content=\"vminded.com\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-29T15:15:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-08-29T15:15:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-29-at-16.19.58-1024x547.png\" \/>\n<meta name=\"author\" content=\"Christophe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Christophe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/vminded.com\/index.php\/2022\/08\/29\/how-to-leverage-nated-t1-gateway-for-overlapping-networks-over-a-route-based-vpn-to-a-tgw\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/vminded.com\/index.php\/2022\/08\/29\/how-to-leverage-nated-t1-gateway-for-overlapping-networks-over-a-route-based-vpn-to-a-tgw\/\"},\"author\":{\"name\":\"Christophe\",\"@id\":\"https:\/\/vminded.com\/#\/schema\/person\/1800a04c708828d9b5c7b64f8eab3b3a\"},\"headline\":\"How to leverage NATed T1 Gateway for overlapping networks over a Route Based VPN to a TGW\",\"datePublished\":\"2022-08-29T15:15:47+00:00\",\"dateModified\":\"2022-08-29T15:15:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/vminded.com\/index.php\/2022\/08\/29\/how-to-leverage-nated-t1-gateway-for-overlapping-networks-over-a-route-based-vpn-to-a-tgw\/\"},\"wordCount\":954,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/vminded.com\/#\/schema\/person\/1800a04c708828d9b5c7b64f8eab3b3a\"},\"image\":{\"@id\":\"https:\/\/vminded.com\/index.php\/2022\/08\/29\/how-to-leverage-nated-t1-gateway-for-overlapping-networks-over-a-route-based-vpn-to-a-tgw\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-29-at-16.19.58-1024x547.png\",\"articleSection\":[\"VMConAWS\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/vminded.com\/index.php\/2022\/08\/29\/how-to-leverage-nated-t1-gateway-for-overlapping-networks-over-a-route-based-vpn-to-a-tgw\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/vminded.com\/index.php\/2022\/08\/29\/how-to-leverage-nated-t1-gateway-for-overlapping-networks-over-a-route-based-vpn-to-a-tgw\/\",\"url\":\"https:\/\/vminded.com\/index.php\/2022\/08\/29\/how-to-leverage-nated-t1-gateway-for-overlapping-networks-over-a-route-based-vpn-to-a-tgw\/\",\"name\":\"How to leverage NATed T1 Gateway for overlapping networks over a Route Based VPN to a TGW - vminded.com\",\"isPartOf\":{\"@id\":\"https:\/\/vminded.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/vminded.com\/index.php\/2022\/08\/29\/how-to-leverage-nated-t1-gateway-for-overlapping-networks-over-a-route-based-vpn-to-a-tgw\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/vminded.com\/index.php\/2022\/08\/29\/how-to-leverage-nated-t1-gateway-for-overlapping-networks-over-a-route-based-vpn-to-a-tgw\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-29-at-16.19.58-1024x547.png\",\"datePublished\":\"2022-08-29T15:15:47+00:00\",\"dateModified\":\"2022-08-29T15:15:49+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/vminded.com\/index.php\/2022\/08\/29\/how-to-leverage-nated-t1-gateway-for-overlapping-networks-over-a-route-based-vpn-to-a-tgw\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/vminded.com\/index.php\/2022\/08\/29\/how-to-leverage-nated-t1-gateway-for-overlapping-networks-over-a-route-based-vpn-to-a-tgw\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/vminded.com\/index.php\/2022\/08\/29\/how-to-leverage-nated-t1-gateway-for-overlapping-networks-over-a-route-based-vpn-to-a-tgw\/#primaryimage\",\"url\":\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-29-at-16.19.58.png\",\"contentUrl\":\"https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-29-at-16.19.58.png\",\"width\":1886,\"height\":1008},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/vminded.com\/index.php\/2022\/08\/29\/how-to-leverage-nated-t1-gateway-for-overlapping-networks-over-a-route-based-vpn-to-a-tgw\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/vminded.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to leverage NATed T1 Gateway for overlapping networks over a Route Based VPN to a TGW\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/vminded.com\/#website\",\"url\":\"https:\/\/vminded.com\/\",\"name\":\"vminded.com\",\"description\":\"feed your mind with virtual thoughts\",\"publisher\":{\"@id\":\"https:\/\/vminded.com\/#\/schema\/person\/1800a04c708828d9b5c7b64f8eab3b3a\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/vminded.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\/\/vminded.com\/#\/schema\/person\/1800a04c708828d9b5c7b64f8eab3b3a\",\"name\":\"Christophe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/vminded.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8a35247a893da5c4bd4e7b117047b93859d3def341ac950cf2285f9d9b9220bf?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8a35247a893da5c4bd4e7b117047b93859d3def341ac950cf2285f9d9b9220bf?s=96&d=mm&r=g\",\"caption\":\"Christophe\"},\"logo\":{\"@id\":\"https:\/\/vminded.com\/#\/schema\/person\/image\/\"},\"sameAs\":[\"http:\/\/vminded.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to leverage NATed T1 Gateway for overlapping networks over a Route Based VPN to a TGW - vminded.com","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/vminded.com\/index.php\/2022\/08\/29\/how-to-leverage-nated-t1-gateway-for-overlapping-networks-over-a-route-based-vpn-to-a-tgw\/","og_locale":"en_US","og_type":"article","og_title":"How to leverage NATed T1 Gateway for overlapping networks over a Route Based VPN to a TGW - vminded.com","og_description":"I have seen a lot of customers having overlapping IP subnets among their applications and who wanted to avoid renumbering their network segments when they migrate them to the cloud. In the recent 1.18 release of VMware Cloud on AWS, we have added the ability for customers to create additional T1 Compute Gateways . Additional &hellip; Continue reading \"How to leverage NATed T1 Gateway for overlapping networks over a Route Based VPN to a TGW\"","og_url":"https:\/\/vminded.com\/index.php\/2022\/08\/29\/how-to-leverage-nated-t1-gateway-for-overlapping-networks-over-a-route-based-vpn-to-a-tgw\/","og_site_name":"vminded.com","article_published_time":"2022-08-29T15:15:47+00:00","article_modified_time":"2022-08-29T15:15:49+00:00","og_image":[{"url":"https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-29-at-16.19.58-1024x547.png","type":"","width":"","height":""}],"author":"Christophe","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Christophe","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/vminded.com\/index.php\/2022\/08\/29\/how-to-leverage-nated-t1-gateway-for-overlapping-networks-over-a-route-based-vpn-to-a-tgw\/#article","isPartOf":{"@id":"https:\/\/vminded.com\/index.php\/2022\/08\/29\/how-to-leverage-nated-t1-gateway-for-overlapping-networks-over-a-route-based-vpn-to-a-tgw\/"},"author":{"name":"Christophe","@id":"https:\/\/vminded.com\/#\/schema\/person\/1800a04c708828d9b5c7b64f8eab3b3a"},"headline":"How to leverage NATed T1 Gateway for overlapping networks over a Route Based VPN to a TGW","datePublished":"2022-08-29T15:15:47+00:00","dateModified":"2022-08-29T15:15:49+00:00","mainEntityOfPage":{"@id":"https:\/\/vminded.com\/index.php\/2022\/08\/29\/how-to-leverage-nated-t1-gateway-for-overlapping-networks-over-a-route-based-vpn-to-a-tgw\/"},"wordCount":954,"commentCount":1,"publisher":{"@id":"https:\/\/vminded.com\/#\/schema\/person\/1800a04c708828d9b5c7b64f8eab3b3a"},"image":{"@id":"https:\/\/vminded.com\/index.php\/2022\/08\/29\/how-to-leverage-nated-t1-gateway-for-overlapping-networks-over-a-route-based-vpn-to-a-tgw\/#primaryimage"},"thumbnailUrl":"https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-29-at-16.19.58-1024x547.png","articleSection":["VMConAWS"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/vminded.com\/index.php\/2022\/08\/29\/how-to-leverage-nated-t1-gateway-for-overlapping-networks-over-a-route-based-vpn-to-a-tgw\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/vminded.com\/index.php\/2022\/08\/29\/how-to-leverage-nated-t1-gateway-for-overlapping-networks-over-a-route-based-vpn-to-a-tgw\/","url":"https:\/\/vminded.com\/index.php\/2022\/08\/29\/how-to-leverage-nated-t1-gateway-for-overlapping-networks-over-a-route-based-vpn-to-a-tgw\/","name":"How to leverage NATed T1 Gateway for overlapping networks over a Route Based VPN to a TGW - vminded.com","isPartOf":{"@id":"https:\/\/vminded.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/vminded.com\/index.php\/2022\/08\/29\/how-to-leverage-nated-t1-gateway-for-overlapping-networks-over-a-route-based-vpn-to-a-tgw\/#primaryimage"},"image":{"@id":"https:\/\/vminded.com\/index.php\/2022\/08\/29\/how-to-leverage-nated-t1-gateway-for-overlapping-networks-over-a-route-based-vpn-to-a-tgw\/#primaryimage"},"thumbnailUrl":"https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-29-at-16.19.58-1024x547.png","datePublished":"2022-08-29T15:15:47+00:00","dateModified":"2022-08-29T15:15:49+00:00","breadcrumb":{"@id":"https:\/\/vminded.com\/index.php\/2022\/08\/29\/how-to-leverage-nated-t1-gateway-for-overlapping-networks-over-a-route-based-vpn-to-a-tgw\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/vminded.com\/index.php\/2022\/08\/29\/how-to-leverage-nated-t1-gateway-for-overlapping-networks-over-a-route-based-vpn-to-a-tgw\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/vminded.com\/index.php\/2022\/08\/29\/how-to-leverage-nated-t1-gateway-for-overlapping-networks-over-a-route-based-vpn-to-a-tgw\/#primaryimage","url":"https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-29-at-16.19.58.png","contentUrl":"https:\/\/vminded.com\/wp-content\/uploads\/2022\/08\/Screenshot-2022-08-29-at-16.19.58.png","width":1886,"height":1008},{"@type":"BreadcrumbList","@id":"https:\/\/vminded.com\/index.php\/2022\/08\/29\/how-to-leverage-nated-t1-gateway-for-overlapping-networks-over-a-route-based-vpn-to-a-tgw\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/vminded.com\/"},{"@type":"ListItem","position":2,"name":"How to leverage NATed T1 Gateway for overlapping networks over a Route Based VPN to a TGW"}]},{"@type":"WebSite","@id":"https:\/\/vminded.com\/#website","url":"https:\/\/vminded.com\/","name":"vminded.com","description":"feed your mind with virtual thoughts","publisher":{"@id":"https:\/\/vminded.com\/#\/schema\/person\/1800a04c708828d9b5c7b64f8eab3b3a"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/vminded.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/vminded.com\/#\/schema\/person\/1800a04c708828d9b5c7b64f8eab3b3a","name":"Christophe","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/vminded.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8a35247a893da5c4bd4e7b117047b93859d3def341ac950cf2285f9d9b9220bf?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8a35247a893da5c4bd4e7b117047b93859d3def341ac950cf2285f9d9b9220bf?s=96&d=mm&r=g","caption":"Christophe"},"logo":{"@id":"https:\/\/vminded.com\/#\/schema\/person\/image\/"},"sameAs":["http:\/\/vminded.com"]}]}},"_links":{"self":[{"href":"https:\/\/vminded.com\/index.php\/wp-json\/wp\/v2\/posts\/1730","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/vminded.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/vminded.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/vminded.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/vminded.com\/index.php\/wp-json\/wp\/v2\/comments?post=1730"}],"version-history":[{"count":73,"href":"https:\/\/vminded.com\/index.php\/wp-json\/wp\/v2\/posts\/1730\/revisions"}],"predecessor-version":[{"id":1841,"href":"https:\/\/vminded.com\/index.php\/wp-json\/wp\/v2\/posts\/1730\/revisions\/1841"}],"wp:attachment":[{"href":"https:\/\/vminded.com\/index.php\/wp-json\/wp\/v2\/media?parent=1730"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/vminded.com\/index.php\/wp-json\/wp\/v2\/categories?post=1730"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/vminded.com\/index.php\/wp-json\/wp\/v2\/tags?post=1730"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}