Solved

Internet connectivity through VPN

Posted on 2004-08-15
5
267 Views
Last Modified: 2010-04-11
I have a main building and a remote building on the same property.    The remote building needs to access the main building network and Internet connection.  

The buildings are connected via a wireless setup with lan port on each local network and a wireless card connecting the 2 buildings.  The buildings have a VPN connection between the 2 and I can access each others local network resources just fine.  

However, the remote building can not surf the Internet.  I assume I am missing a static route to make this work.

We are using a Soekris embedded pc and m0n0wall as the OS.


Main building:

Inet connection to router to switch to computers & wireless setup.

Router has realworld PPOE connection and address to Internet provider.
The router LAN connection is 192.168.1.254/24.

The wireless setup LAN port has 192.168.1.200/24.
The wireless setup WAN port is 192.168.50.1/30.

Router has a static route to the remote building lan 192.168.2.254
192.168.2.0/24 -> 192.168.1.200


Remote building:

The wireless setup WAN port is 192.168.50.2/30
The wireless setup LAN port is 192.168.2.254/24

There is an established VPN tunnel between the 2 WAN ports and everything works internally just the remote building network can't access the Internet.


Thanks


 
 
 
0
Comment
Question by:postal1969
5 Comments
 
LVL 3

Accepted Solution

by:
fatlad earned 250 total points
Comment Utility
Does the remote site WAN router have a specific static route to the 192.168.1.x network or does it use a more general 0.0.0.0 route?
0
 
LVL 7

Assisted Solution

by:EmpKent
EmpKent earned 250 total points
Comment Utility
You need to give the remote site a Hail Mary route.

0.0.0.0 0.0.0.0 192.168.1.254

This will tell it to send anything that is not local to the Inet facing router.

Kent
0
 

Author Comment

by:postal1969
Comment Utility
Thanks I'll give these a try tonight...  I was thinking about Kent's answer but didn't remember if I had tried it in all of the combos I tried.

0

Featured Post

Maximize Your Threat Intelligence Reporting

Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

Join & Write a Comment

This is the first one of a series of articles I’ll be writing to address technical issues that are always referred to as network problems. The network boundaries have changed, therefore having an understanding of how each piece in the network  puzzl…
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

728 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now