Hi there,
I've got two home networks A (main) and B, both are running Mikrotik Routers, A is an OpenVPN Server.
I want to connect B to A as a VPN client to be able to access machines in A, from B, and machines in B, from A.
I've created an interface and route on B, and on the main router it seems to work.
However, I've got two cap AC Lite that act as WIFI bridgtes (connected via Ethernet to the main router).
And from there, I cannot seem to access the machines in A.
Here is the setup:
Network A:
Mikrotik, running the OpenVPN Server
IP Range: 192.168.1.x
Network B:
Mikrotik, acting as a VPN Client
IP Range: 192.168.88.x
Two cap AC Lite bridges: 192.168.251/252
The interface and route on B, the client, looks like this:
I've read that in some circumstances one needs to define return routes from the server (A), however, that masquerading should take care of it.
Can anyone help me to get this working? Thanks in advance!
I've got two home networks A (main) and B, both are running Mikrotik Routers, A is an OpenVPN Server.
I want to connect B to A as a VPN client to be able to access machines in A, from B, and machines in B, from A.
I've created an interface and route on B, and on the main router it seems to work.
However, I've got two cap AC Lite that act as WIFI bridgtes (connected via Ethernet to the main router).
And from there, I cannot seem to access the machines in A.
Here is the setup:
Network A:
Mikrotik, running the OpenVPN Server
IP Range: 192.168.1.x
Network B:
Mikrotik, acting as a VPN Client
IP Range: 192.168.88.x
Two cap AC Lite bridges: 192.168.251/252
The interface and route on B, the client, looks like this:
Code:
[admin@cas_main] > /interface print Flags: D - dynamic, X - disabled, R - running, S - slave # NAME TYPE ACTUAL-MTU L2MTU MAX-L2MTU MAC-ADDRESS 0 RS ether1 ether 1500 1598 2028 B8:69:F4:92:6B:51 1 S wlan1 wlan 1500 1600 2290 B8:69:F4:92:6B:52 2 R ;;; defconf bridge bridge 1500 1598 B8:69:F4:92:6B:51 3 R lte1 lte 1500 00:11:22:33:44:56 4 R ovpn-out1 ovpn-out 1500 02:02:3D:A0:14:50 /ip route print Flags: X - disabled, A - active, D - dynamic, C - connect, S - static, r - rip, b - bgp, o - ospf, m - mme, B - blackhole, U - unreachable, P - prohibit # DST-ADDRESS PREF-SRC GATEWAY DISTANCE 0 ADS 0.0.0.0/0 lte1 2 1 ADC 10.176.26.88/32 10.176.26.88 lte1 0 2 A S 192.168.1.0/24 ovpn-out1 1 3 ADC 192.168.87.0/24 192.168.87.243 ovpn-out1 0 4 ADC 192.168.88.0/24 192.168.88.1 bridge 0 [admin@cas_main] > /interface ovpn-client print Flags: X - disabled, R - running 0 R name="ovpn-out1" mac-address=02:02:3D:A0:14:50 max-mtu=1500 connect-to=xxx port=1194 mode=ip user="xxx" password="xxx" profile=default certificate=client.crt_0 verify-server-certificate=no auth=sha1 cipher=aes128 use-peer-dns=no add-default-route=no
I've read that in some circumstances one needs to define return routes from the server (A), however, that masquerading should take care of it.
Can anyone help me to get this working? Thanks in advance!
Statistics: Posted by chbla — Sun Dec 31, 2023 12:50 pm