Avatar of DrDamnit
DrDamnitFlag for United States of America

asked on 

Static Route over VPN

I have a box to box vpn setup between two offices.

In office T, the network is 192.168.240.1. In office A, the network is 192.168.250.1. The box to box VPN and static route from A to T works great. I can ping any machine on either network.

THere is a wrinkle here though... Box A's gateway is 192.168.250.1. THey have a Comcast Cable service. So, the WAN interface of the firewall that is doing the box to box VPN (m0n0wall) is plugged into a comcast gateway. From the 192.160.250.0/24 network, we can access the comcast box by typing 10.1.10.1. It works. From the T network, it doesn't.

I tried setting up a static route from 192.168.240.0/24 -> Gateway(192.168.250.1) -> 10.1.10.0/24, but the local gateway (T) just tells me that 10.1.10.1 is not reachable (message originates from 192.168.240.1, the gateway in office T).

How should I be setting up this static route?
Linux NetworkingSoftware FirewallsVPN

Avatar of undefined
Last Comment
DrDamnit
ASKER CERTIFIED SOLUTION
Avatar of mccracky
mccracky
Flag of United States of America image

Blurred text
THIS SOLUTION IS ONLY AVAILABLE TO MEMBERS.
View this solution by signing up for a free trial.
Members can start a 7-Day free trial and enjoy unlimited access to the platform.
See Pricing Options
Start Free Trial
SOLUTION
Avatar of Qlemo
Qlemo
Flag of Germany image

Blurred text
THIS SOLUTION IS ONLY AVAILABLE TO MEMBERS.
View this solution by signing up for a free trial.
Members can start a 7-Day free trial and enjoy unlimited access to the platform.
Avatar of DrDamnit
DrDamnit
Flag of United States of America image

ASKER

no hair-pinning allowed seems to be it.
VPN
VPN

A virtual private network (VPN) is a network that uses a public telecommunication infrastructure, such as the Internet, to provide remote offices or travelling users access to a central organizational network securely. VPNs encapsulate data transfers using secure cryptographic methods and other security mechanisms to ensure that only authorized users can access the network and that the data cannot be intercepted.

26K
Questions
--
Followers
--
Top Experts
Get a personalized solution from industry experts
Ask the experts
Read over 600 more reviews

TRUSTED BY

IBM logoIntel logoMicrosoft logoUbisoft logoSAP logo
Qualcomm logoCitrix Systems logoWorkday logoErnst & Young logo
High performer badgeUsers love us badge
LinkedIn logoFacebook logoX logoInstagram logoTikTok logoYouTube logo