Second device in client network without VPN

Need help configuring your VPN? Just post here and you'll get that help.

Moderators: TinCanTech, TinCanTech, TinCanTech, TinCanTech, TinCanTech, TinCanTech

Forum rules
Please use the [oconf] BB tag for openvpn Configurations. See viewtopic.php?f=30&t=21589 for an example.
Post Reply
ilbafio77
OpenVpn Newbie
Posts: 1
Joined: Wed Apr 14, 2021 12:55 pm

Second device in client network without VPN

Post by ilbafio77 » Wed Apr 14, 2021 1:04 pm

Hi all.
i tried to search a similar discussion but nothing.
Here the map: https://ibb.co/VCM3MNd


My request is to reach the NAS in remote network from My house network.
I mapperd the NAS share on RPi client and i able to show the file from my network using \\192.168.3.2\myfiles\ but, i would like to show the NAS directly on my network.
The NAS can't permit Openvpn.

What can i do?
Is it possible?

Client config files:

Code: Select all

client
dev tun
proto udp
remote XXXX.ddns.net 1193
ping-restart 5
resolv-retry infinite
nobind
persist-key
persist-tun
remote-cert-tls server
tls-version-min 1.2
verify-x509-name server_QOxdZLRqswYSp6BV name
cipher AES-256-CBC
auth SHA256
auth-nocache
verb 3
route 192.168.1.128 255.255.255.128
route 192.168.1.96 255.255.255.224
Server config files:

Code: Select all

dev tun
proto udp
port 1193
ca /etc/openvpn/easy-rsa/pki/ca.crt
cert /etc/openvpn/easy-rsa/pki/issued/server_QOxdZLRqswYSp6BV.crt
key /etc/openvpn/easy-rsa/pki/private/server_QOxdZLRqswYSp6BV.key
dh none
topology subnet
server 192.168.3.0 255.255.255.0
##route-gateway 192.168.3.1
#client-config-dir ccd
# Set your primary domain name server address for clients
push "dhcp-option DNS 8.8.8.8"
push "dhcp-option DNS 8.8.4.4"
# Prevent DNS leaks on Windows
push "block-outside-dns"
# Override the Client default gateway by using 0.0.0.0/1 and
# 128.0.0.0/1 rather than 0.0.0.0/0. This has the benefit of
# overriding but not wiping out the original default gateway.
push "redirect-gateway def1"
client-to-client
keepalive 1800 3600
remote-cert-tls client
tls-version-min 1.2
tls-crypt /etc/openvpn/easy-rsa/pki/ta.key
cipher AES-256-CBC
auth SHA256
user nobody
group nogroup
persist-key
persist-tun
crl-verify /etc/openvpn/crl.pem
status /var/log/openvpn-status.log 20
status-version 3
syslog
verb 3
#DuplicateCNs allow access control on a less-granular, per user basis.
#Remove # if you will manage access by user instead of device.
#duplicate-cn
# Generated for use by PiVPN.io

Post Reply