Quote from: dseven on March 12, 2025, 09:44:17 AMIf you took the old router out and only OPNsense remained, it would have **only one** LAN ("int") address, and that would be the default gateway for (all of) your LAN servers. Presumably you would use 10.10.10.1 for that and forget 10.10.10.2.Fair enough.
For the NAT hack, if you could clarify a few things I think I can run with it.
(I do think the static route on LAN servers would work too, but maybe only with TCP, so I'll start with NAT)
1. Should I manually bind an interface to the vpn device? Docs say this may be required for reply-to and other NAT functions to work properly.
a. Set IP on if, or use whatever passthrough settings from ovpn?
b. Dynamic gateway checked?
2. Outgoing NAT masq- To confirm, this should be the LAN IP, not VPN tunnel IP? (I realize tunnel would require a static route in endpoint OS to work, but LAN I question if ovpn will automatically see/pick that up as return traffic)
a. If LAN: Outbound NAT policy on 1OpenVPN default created if, or on 2manually created interface (if created in step1)?
b. ^ policy: source= Tunnel network > dest= LAN net > translation target= LAN address? [or manually specify 10.10.10.1]
3. Troubleshooting- if the NAT masq works, packets come back to LAN IP, but ovpn doesn't seem to be picking them up.. where/how could I see the logs for discarded packet, no route, etc to find the breakdown?
4. Any general options that should/shouldn't be enabled. I am removing all auto-added pass/deny policies and switching to manual outbound NAT only, but may still have some non-default setting leftover from testing.
I truly appreciate any help, if I can get this working I think I'll be sold and join team OPNsense. Then I'll be happy to support the cause as well; I'm actually not another random FOSS user that expects on-site support and a guided tour, but it is all (frustratingly) new to me and the documentation can be vague at times.