My network structure is as follows:
- Main WAN/WiFi router provides access to internet. It’s IP is 192.168.1.1 and it assigns clients IP addresses via DHPC in the range 192.168.1.100-200. Standard stuff.
- To extend WiFi range in my house, I have connected three extenders in strategic places. They are all connected by cable. Their IPs are manually set at 192.168.1.2/3/4. They are set up as bridges, so clients that connect wirelessly to the extenders are assigned IP addresses by the main router in the range indicated above.
- The route and the extenders all use the same SSID so clients connect and switch seemlessly through my home.
Everything works well.
Now, I have a Google Chromecast that I need to connect via a VPN to deal with geo restrictions. I don’t want anything else on my network accessing the internet through a VPN for many reasons. So, I have bought a GL.Inet 150m router to act as a wireless bridge with VPN. I have set this up as follows:
- The 150m is connected by cable to one of the extenders, using the LAN port. It’s set up as a bridge to the main network above, through which it accesses the internet. It is assigned 192.168.1.195 by the main router by DHPC.
- The 150m’s SSID is MYTYPICALNETWORKNAME_VPN (the “_VPN” is the added part), ie it runs its own wireless network. On this network its IP is 192.168.8.1, and it assigns clients IP addresses in the range 192.168.8.10-100.
- Google Chromecast is set up via the MYTYPICALNETWORKNAME_VPN WiFi.
- The 150m is then connected to a VPN via OpenVPN.
This gives 95% of the functionality that I want: Google Chromecast (alone) accesses the internet via the 150m and its VPN connection.
My challenge is as follows:
a) To use the Chromecast, users have to switch WiFi from MYTYPICALNETWORNAME to MYTYPICALNETWORKNAME_VPN. This is an added step that I’d like to avoid.
b) Since the Chromecast is on its own network/subnet, it cannot access resources that I have on my server that’s on the main network (192.168.1.10).
So, finally, my question:
Is there a way to place the MYTYPICALNETWORKNAME_VPN network within the same network/subnet as the main network as described above? So that users that connect to my network via MYTYPIPCALNETWORKNAME can still manage and access resources within the MYTYPICALNETWORKNAME_VPN network and vice-versa? Optimally, I’d have the 150m act as my extenders do, ie resides within the main network/subnet, it onpassess DHPC addresses from the main router etc but clients that connect wirelessly to it has its traffic routed via the VPN tunnel for what concerns the internet.
I hope this all makes sense. Given the number of options and level of customization possible with the Gl.Inet routers I have a feeling that it is possible, but all the things I have tried breaks the internet access of the 150m.