Allow two different internet sources to OpenVPN appliance
Right now I have two separate WANs which I'd like to set up so that either one will allow my users to connect to our vpn. I'm testing with port 3389 because it's a little easier. The users client will try WAN1 first and then WAN2 if there is an issue.
WAN1 is on G1 and WAN2 is on G2 LAN is G3.
From my home pc (PC2) I connect to WAN2's public ip which is forwarded to PC1 and the vpn log says "ACCESS FORWARD" so I know it at least got to PC1, but it looks like it wasn't able to talk back to PC2. I'm assuming it came in WAN2, but went back out WAN1.
My thoughts are something needs to change with the policy routes, but that's just a guess.
WAN1 is on G1 and WAN2 is on G2 LAN is G3.
From my home pc (PC2) I connect to WAN2's public ip which is forwarded to PC1 and the vpn log says "ACCESS FORWARD" so I know it at least got to PC1, but it looks like it wasn't able to talk back to PC2. I'm assuming it came in WAN2, but went back out WAN1.
My thoughts are something needs to change with the policy routes, but that's just a guess.
0
All Replies
-
It looks like I answered my own question. I had a policy route for each wan with the next hop being WAN1 and WAN2 respectively. I added a third at the top and set the next hop to auto which seems to be working now.0
-
Hi @ACS
In your scenario, the NAT rule is working on WAN1.
So it means DRP server must response by WAN1 interface.
If policy route forced traffic pass through by WAN2, then PC2 will drop packets.
It is because PC2 receives response packets with unknown IP address.
0
Categories
- All Categories
- 414 Beta Program
- 2.3K Nebula
- 132 Nebula Ideas
- 91 Nebula Status and Incidents
- 5.4K Security
- 180 USG FLEX H Series
- 258 Security Ideas
- 1.4K Switch
- 71 Switch Ideas
- 1K Wireless
- 37 Wireless Ideas
- 6.2K Consumer Product
- 236 Service & License
- 372 News and Release
- 79 Security Advisories
- 24 Education Center
- 5 [Campaign] Zyxel Network Detective
- 2.9K FAQ
- 34 Documents
- 34 Nebula Monthly Express
- 80 About Community
- 69 Security Highlight