I was wondering if there is more documentation around getting OpenVPN or IPsec configured with NAT, I am connecting to a remote site who is using the same LAN IP subnet, I found the following documentation https://wiki.opnsense.org/manual/how-tos/ipsec-s2s-binat.html but wondering if it will work with OpenVPN? Do I have to allow remote connectivity to my entire subnet or can I do /32 NAT 1:1?
Don’t confuse doing NAT with setting firewall rules… Set up the 1:1 NAT for the whole subnet then use firewall rules to determine who can and can’t traverse the link.
Thought about it, not really interested in re-iping everything. Plus if i wanted to do another site to site in the future having to re-IP again isnt something I want to do multiple times.
I have the absolute damnest time figuring out where to place said rules, would they be on the interface I want to allow from or from the openvpn interface in?
Personally I would treat the site-to-site VPN interfaces as if they were WAN interfaces. Allow everything outgoing and restrict incoming. You’d put those rules on the VPN interfaces to protect the local network in each site.
Re-reading your OP, if only one IP needs access to the remote site, why wouldn’t you set that computer up as a “road warrior” of the other site and enable split tunneling so you can access both networks? You’d use a completely different network on the remote site for the incoming VPN connection that didn’t overlap with any of the remote site networks. That would be much simpler to manage IMHO.
So I ended up creating a 10.81.81.0/24 network on the remote side, added a gateway and put the server on that network. Assigned the 10.81.81.0/24 to be remote for my side, I can ping the remote computer 10.81.81.10 from the firewall but cannot access it via inside network. I can see the packets in the firewall PASS on both my side and remote side, the only odd thing im seeing is my Inside address on the remote firewall. Would having two overlapping inside networks cause a return path issue?