I'm using a Brume 2 as my home router, which is acting as a Wireguard Server and Client (VPN Policy based on the Client Device -- currently only a handful of devices in the network)
Also, as part of a ZeroTier network. Locally, I'm able to access all resources as part of the ZT network,
Managed Routes on ZT:
192.168.7.0/24 via 192.168.194.195
192.168.8.0/24 via 192.168.194.86
However, when connected remotely via Wireguard to the Brume 2 (Client Allowed IPs 0.0.0.0/0, ::/0, so full tunnel)) I can't access those ZeroTier resources, only things within my own local LAN.
In other words, when connected via VPN to my home router I can access resources within 10.1.0.0/24 (My LAN) + internet at large, but 192.168.7.1 or 192.168.8.54 are not accesible.
Instead of adding another device (or route) to ZeroTier, I was hoping to get into my SD-WAN via the Brume2 acting as a bridge.
Are there any extra steps that I can apply to achieve that?
Note: I did NOT add 10.1.0./24 as a ZeroTier Managed Route.
I have a rough understanding of your network topology diagram.
It may not be possible to implement such a WG Client - WG Server - Zerotier link since there is no corresponding route on the Client router and Server router.
If a new route is manually added, it may cause WAN (Internet) exception.
If you want to access resources from Zerotier, you should also enable Zeroter on the Client router and add the same Network ID.
Thanks Bruce, ended up adding my home router to the ZeroTier network, and everything works now, including accessing resources on my home network.
I used to VPN into my home each time I needed to access my network drives, cameras, or anything hosted locally, now I just do it when I need full tunneling (i.e. I'm abroad and need my home IP address as the exit node).
Can't be more happy that I went with a GL-iNET router. Brume 2 is overall a great gateway device. ZeroTier and Tailscale router support works great.