I had the opportunity to try it out today. The NAT rule alone was not sufficient, I had also to add an IN rule for the LAN interface, otherwise the packets did not even reach the NAT rules. So to sum up, one needs:
- to allow the private networks on the WAN interface
- a gateway in the 10.1.100.0/24 subnet
- static route(s) for the subnet(s)
- IN rules for the subnet(s) on the LAN interface
- NAT mode set to hybrid and a NAT rule the subnet(s)
It works now. However, I will probably have to go for a VLAN-based model in the end, because I need to manage several WLAN networks with different network permissions. The way I see it, VLAN are the best way to cover this, with OPNsense managing the permissions.
- to allow the private networks on the WAN interface
- a gateway in the 10.1.100.0/24 subnet
- static route(s) for the subnet(s)
- IN rules for the subnet(s) on the LAN interface
- NAT mode set to hybrid and a NAT rule the subnet(s)
It works now. However, I will probably have to go for a VLAN-based model in the end, because I need to manage several WLAN networks with different network permissions. The way I see it, VLAN are the best way to cover this, with OPNsense managing the permissions.