This is correct.Traffic wrote:Your private LAN is conflicting with your Hotspot LAN and so routing is broken.nino wrote:PRIVATE LAN: 192.168.1.0/24
VPN LAN: 10.8.0.0/24
HOTSPOT LAN: 192.168.1.0/24
Change your private LAN to something else .. like 192.168.137.0/24
Another example would be, for instance:
Private LAN: 192.168.1.0/24
HotSpot LAN: 192.168.2.0/24
IPv4 Local Networks: 192.168.1.0/24,192.168.2.0/24
VPN LAN: 192.168.3.0/24 (IPv4 Tunnel Network)
Make sure to add route-statements for each of the internal networks. In my first example, I do not segment my Wifi traffic from my internal ethernet traffic, so they are on the same subnet.
If you're going to have a separate subnet for your HotSpot, and you want to be able to route traffic from VPN clients to that subnet, then you'll need a route statement for it, as in the example above, "IPv4 Local Networks". This statement is what tells the VPN server which subnets are to be statically routed.
"Traffic" is correct in his statement that your private LAN and HotSpot LAN are conflicting, at least if those two LANs are not physically connected via a router in between. Routers cannot generally split parts of the subnet into different physical locations, unless the router is configured to use a smaller CIDR. To get an idea of how to calculate the subnet configuration, use a tool like SolarWinds Subnet Calculator (it's great, and I use it professionally), which will allow you to carve up subnets however you see fit within the logic of the IPv4 addressing scheme.
A good example of how that could work, using 26bit subnets (as opposed to 24bit)
---
Ethernet-Client-LAN: 192.168.1.0/26 (192.168.1.1~192.168.1.62)
[network address: 192.168.1.0; mask: 255.255.255.192; broadcast: 192.168.1.63]
---
Wifi/HotSpot-Client-LAN: 192.168.1.64/26 (192.168.1.65~192.168.1.126)
[network address: 192.168.1.64; mask: 255.255.255.192; broadcast: 192.168.1.127]
---
VPN-Client-LAN: 192.168.1.128/26 (192.168.1.129~192.168.1.190)
[network address: 192.168.1.128; mask: 255.255.255.192; broadcast: 192.168.1.191]
---
Nino: As you can see by this example, the subnet mask is what shrinks the subnet down to a smaller size so that a smaller number of IP addresses can be divided in a way that creates 3 separate subnets, each with 62 usable IP addresses. The critical thing to notice here is that all traffic is segmented properly. Now, we use static route statements to bridge those subnets. Your edge-router and any internal routers may also need statements to instruct them to look on the local wire for any segments that are local to the wire, and to look to the VPN server for any routes contained only there. For instance, I can add my VPN subnet as a static route, using the Router's internal IP address as the gateway to that route, and this will allow my internal clients to connect directly to a VPN client that is already connected to the VPN server. It all comes down to proper traffic routing though.
Beyond what I've presented here, it would be hard to say what the problem is, because if your routing is configured correctly, then there shouldn't be an issue with IOS provided that the IOS client functions correctly. IOS should handle routing statements during dynamic socket negotiation no different than any other networked OS, but that's not to say that IOS conforms 100% to RFC standards for TCP/IPv4... it should, but I don't have enough information to make that assessment.