I'm playing around with my new Asus router that has an OpenVPN-server option. It works fine connecting to the router's VPN and accessing my devices in my home LAN (except for one...).
There is one computer in the network (a raspberry pi), that is connected to a WireGuard server. I managed to add an iptable rule that allows all LAN devices on 10.0.128.X to connect to the pi when it's connected to the WG-server (hosted by my VPN-provider). The final piece of the puzzle right now is to make it possible to reach the pi when I'm in my home LAN through the Asus router's VPN tunnel.
I really don't know where to look or change the config to enable this. So far I have not found any logs that could give me a clue. What I've tried this far is bypassing the ufw - firewall in my pi, flushed all iptable-entries and played around with the WG-client configs "AllowsIPs".
Would be great to get some guidance for you.
To summarise:
By running ssh user@10.0.128.110
(pi's address on eth0):
Devices in the 10.0.128.x
subnet are able to ssh into the pi when it's behind WG.
Devices in the 10.8.0.x
subnet are able to ssh into devices in the 10.0.128.x
subnet
No device in the 10.8.0.x
subnet is not able to ssh into the pi when it's behind WG. (This is the one I'm trying to figure out).
Best regards /KS