› Forums › Network Management › VPN › Tunnel all traffics (everything) through LAN-to-LAN VPN › Reply To: Tunnel all traffics (everything) through LAN-to-LAN VPN
Just tried, on the fly, but in real topology:
ZS-A , vpn server, connected to the internet via usb dongle (pppp0) , ETH00 192.168.10.1/24, VPN00 inner address 10.20.20.1.
ZS-B, vpn client , connected to the internet (but behind a fw), ETH00 192.168.0.1/24, ETH00.12 192.168.12.1/24, ETH00.13 192.168.13.1/24, ETH00.14 192.168.14.1/24 , VPN00 inner address 10.20.20.2.
On ZS-A , a static-route, 192.168.12.0/22 via 10.20.20.2
On ZS-B , enabled the net-balancer, (LBFO) , as primary gateway the real default-gateway (weight 32), as ‘secondary’ gateway (weight 1) the ip address of the remote vpn peer, 10.20.20.1, then , in balancing rules, one rule , s.ip 192.168.12.0/22, target gateway 10.20.20.1. There is L3 visibilty among all private networks, and the clients of ZS-B are surfing the web via ZS-A.
tracert to google.com from a client of the 192.168.13.0/24 network
Traccia instradamento verso google.com [184.108.40.206]
su un massimo di 30 punti di passaggio:
1 2 ms 1 ms 2 ms 192.168.13.1
2 166 ms 147 ms 144 ms 10.20.20.1
3 292 ms 325 ms 375 ms 172.31.8.70
4 217 ms 195 ms 195 ms ^C
Is enough playing a bit with static routes and, if needed, with some nat rules (for the clients which may belong to the network between Zs and the other fw) for obtain the result.