I'm trying to set up site-to-site VPN between my office and home, but I have a couple of issues that mean I can't set it up in the config the tutorial article for that uses:
So what I'm trying to set up is:
Both routers are Asus -- the home router is an AC3200 and the office is an old N66U, each running latest official Merlin for their respective hardware. (The N66U will probably go to the fork that's continuing support for it soon, but I haven't done that yet.)
My first thought was, just OpenVPN the office router to the home router. That worked, but only one way -- I can access things at home from the office, but not vice-versa, even after setting up routing rules for each side to gateway to the other through the VPN. I can ping the office router's client VPN-side address from home, but not its IP in its own subnet or anything beyond -- those just get dropped. I tried monkeying with the office router's iptables directly to just blanket-allow anything coming from the VPN or the home network, but that didn't work.
- Office network is not numbered the same as home (192.168.33.0/24 at the office, 192.168.1.0/24 at home). I can't renumber the office network and don't want to renumber home (last time I did that some of our devices had issues for days, I think because they didn't handle DHCP lease changes or ARP or something properly).
- Office network is not directly connected to the Internet (my office has its own subnet, routed from the building';s core network which, just to note, is also not 192.168.1.0/24).
So what I'm trying to set up is:
Code:
[192.168.33.0/24] <---> [192.168.19.0/24] <---> (Internet) <---> [192.168.1.0/24]
^ ^
| |
+--------------------------- [VPN subnet] -----------------------+
Both routers are Asus -- the home router is an AC3200 and the office is an old N66U, each running latest official Merlin for their respective hardware. (The N66U will probably go to the fork that's continuing support for it soon, but I haven't done that yet.)
My first thought was, just OpenVPN the office router to the home router. That worked, but only one way -- I can access things at home from the office, but not vice-versa, even after setting up routing rules for each side to gateway to the other through the VPN. I can ping the office router's client VPN-side address from home, but not its IP in its own subnet or anything beyond -- those just get dropped. I tried monkeying with the office router's iptables directly to just blanket-allow anything coming from the VPN or the home network, but that didn't work.
- It seems like the VPN software itself is just dropping connection-opening incoming packets from the other side of the VPN, regardless of iptables rules or anything else.
- Assuming 1) is correct, is there an option or custom config or something I can set that will allow incoming packets to the office side to get through?
- If the answer to 2) is "no", what have people done to get past this sort of thing? Running a VPN connection back to the office from home through an SSH tunnel going over the VPN probably would work, but in the same way that driving cross-country in reverse works. I have a DigitalOcean account and I'm not opposed to running VPN traffic through an SSH reverse tunnel from a cloud instance, but that feels like a good way to run up a hefty transfer bill.
Last edited: