We have site-to-site VPN connections using Azure VPN Gateway and various on-prem network appliances at respective client locations. We are trying to on-board a new connection, but have an IP range conflict with a network on the other end. The diagram below, albeit a loose interpretation on the client side as I don't have all the details on their end, explains it best probably, but here are the facts:
IP Range Conflict on either end of Azure VPN S2S tunnel
- Network A (192.168.1.0/24) sits behind our Azure VPN Gateway and is our responsibility.
- Network B (192.168.2.0/24) is a target network for packets originating from Network A, is our client's responsibility, and is hosted in a private cloud.
- Network C (192.168.1.0/24) is another network within the private cloud that is not relevant for our traffic except that it represents an IP range conflict within the client's private cloud.
Azure support has indicated the only remedy is to re-IP one of the conflicting networks as conflicting ranges are not supported at this time. According to them, NAT is not a viable solution on either end of the tunnel. Adding a new subnet behind the Azure VPN Gateway and forwarding/NAT'ing the traffic to Network A is also not supported.
Because of the fallout of re-IP'ing Network A, we don't want to re-IP it. Unsurprisingly, the client doesn't want to re-IP their network, Network C, either. Maybe I'm just in denial, but has anyone else run into this scenario and successfully worked-around it or resolved it without re-IP'ing? If so, any documentation or configs supporting the solution that could be referenced would be most appreciated.
Thanks in advance for any help.