Hey Colin, thanks!
You'll have to go into more detail.
Which "LAN subnet"? The one where you are or your home LAN?
The home LAN subnet managed by the Asus router - 192.168.50/24
"forward my LAN subnet" What does this mean?
I'd like all hosts on the home LAN to be visible through the VPN tunnel to hosts on the VPN
What is the VPN topology? Where is the client running and where is the server running?
- The VPN is a virtual network through Zerotier with a subnet of 10.0.4.0/24
- the client is a road warrior that connects to the Zerotier VPN.
Edit: client VPN address is 10.0.4.10
- the VPN server in this case would be a host on the home LAN with an interface there (192.168.50.2), as well as an interface on the VPN (10.0.4.2)
Plus any additional information you can think of.
So, the goal is to connect my road warrior to the VPN (zerotier), and be able to see all of the hosts on 192.168.50.0/24 as if it were physically connected to the home network.
On the VPN side (zerotier network), I have a route to 192.168.50.0/24 via 10.0.4.2, and can ping / ssh to 192.168.50.2 from the road warrior.
Edit: to be clear, it's the same host but I can get to it from it's VPN address of 10.0.4.2 or it's home LAN address of 192.168.50.2
I'd like to also be able to ssh/samba to 192.168.50.3 etc. from the road warrior without setting up zerotier on every client on the home LAN, and I think the way to do that is via AsusWRT, adding a static route:
"10.0.4.0/24 via 192.168.50.2"
I don't have access to the AsusWRT web gui on the road, and I figured I'd ask if there was a way to add this via the command line.
I hope this makes sense - thanks for taking a look!