It seems that you have set up an OpenVPN tunnel between a client and a server, and you want to be able to reach LAN devices on both sides using their private IP addresses. Is this correct?
To achieve this, you need to configure OpenVPN to route LAN networks.
To do this, you need to follow a few steps. First, set up your OpenVPN to use TLS and upload the necessary certificates, as shown in the configuration example available here. Make sure to follow the TLS authentication part.
Then, add TLS client on the server and declare the LAN network of the client within these settings. By doing this, the server will know that it needs to route this declared LAN network (for example, 192.168.10.0/24) via, for example, client1. As a result, the server and its LAN devices will be able to reach devices in the LAN network of client1 using their private IP addresses.
If you want devices in the client1 LAN network to reach the LAN network on the server side, you need to push the server's LAN network to the client from the server. To do this, add the following to the push options on the server side (replace the address with the server's LAN network):
- route 192.168.1.0 255.255.255.0
By doing this, the LAN devices on the client1 network (192.168.10.0/24) will be able to reach LAN devices on the server's side (192.168.1.0/24) using their private IP addresses.
You can add more TLS clients on the server. Just make sure to associate them with their respective LAN networks.