Hi all,
Quick question, there might be a very easy way around this but I haven’t found it yet ![]()
I run OpenVPN server on a server on an internal subnet on port 443:TCP (so I can access it from fire walled locations). How can I create a dst-nat mapping that forwards incoming VPN connections on the WAN interface to the internal server. If I create a dst-nat mapping that matches port 443 and protocol TCP it works fine. However, internal machines are no longer able to open HTTPS pages on the internet because all the returning packets are getting directly NAT’ted to the internal server because of the NAT rule I created.
I thought about using the connection-state to keep the 2 types apart, NEW connections which do not have a NAT entry yet would be VPN traffic and EXISTING connections could just be processed by NAT table as normal as both the VPN traffic and HTTPS traffic would have acquired proper NAT table entries. Unfortunately I connection-state is not available when using dst-nat.
Anyone any idea’s? Perhaps some connection-marks or something and then NAT’ting based on those? Wonder if anyone actually manages to decipher my explanation lol ![]()