

The approach of this project was to extend the network security from. Go to the Admin UI and go to VPN Settings. domain-name object network objany subnet 0.0.0.0 0.0.0.0. Security is the second step after that a successful network has been deployed. proto udp dev tun ca ca.crt cert vpnserver.crt key vpnserver.key This file should be kept secret dh dh1024.pem ifconfig-pool-persist ipp.

#Easyvpn network extension duplicat subnets software#
In order to avoid the network conflicts on the OpenVPN server there are not the routing rule for the remote sites, there is a specific lookup routing table for each PC like that: # ip rule shġ0: from all to 10.10.10.0/24 lookup mainĪnd under each # ip route show table 1024ġ92.168.80.0/24 via 10.10.10. I know this software is unsupported for quite some time already, but still works fine and is the only option at this moment. I have an EZVPN running between two locations, Location A has a 5520 and is. For example I can send fake subnet 192.168.43.0/24 to remote users (so it does not overlap with their LAN) and then map it to real 192.168.1.0/24 via ip nat inside source static network 192.168.1.0 192.168.43.0 255.255.255.0.

This setup works perfectly while using TAP device. Your provided configuration is forwarding ports, while I need static NAT mapping 1:1 for whole /24. The PC1 connect to RemoteSite1 and the PC2 connect to RemoteSite2 but while using iroute one of the PCs reach the wrong remote site. I have some issue with an OpenVPN concentrator while using TUN device.
