If this is basic remote access vpn with a vpn client, most firewalls would have you configure a single subnet for the remote vpn users. You can assign an unused subnet from your internal address schema.
The user client would get an ip from this range and all traffic between the client and your network will use this ip.
You shouldn’t need to worry about the remote user LAN ip unless you are doing site to site vpn.
I’m reconjuguring our network and looking for some help choosing an address range
Pick an appropriate unused /64 from your IPv6 allocation and don’t reuse it anywhere else. ULA could be used if you don’t want to funnel Internet traffic up the VPN.
We need to have VPNs working from large organisations on 10.x.x.x, home users on 192.168.x.x and potentially anything in between.
If you must have IPv4 support over the VPN (and can’t get by with DNS64 and NAT64), then 172.16/12 might be your friend here.
172.16.0.0/12 is the least used segment I’ve seen. The most used in that segment is the bottom and top ranges. I think it comes down to people find it harder to type, so they avoid using it.
I would avoid anything in 192.168. On 10, the most common for home routers is 10.0.0.0/24 and 10.0.1.0/24. That leaves a lot of options there to avoid 99% of potential overlaps.
172.16 is pretty rare to ever see as default on any home router, so work within this space, but I would not use 172.16.1.0/24 or 172.16.31.0/24 because human nature will find those to be the most commonly used if someone were to manually pick that for home use.
Those could be in use, but are quite more obscure so the risk of collision is greatly reduced. There are a few more/24, Lookup “Ip reserved address” for the whole list.
On the other hand, collisions are a non-issue if your VPN is configured a certain way in regards to routing. Though that depends heavily whether you need to have your clients access things in the LAN they’re physically connected to or not.
Because often, these organisations have ‘experts’ who insists IPv6 is a deprecated technology - Even though factually, the IETF have stopped development work on IPv4, years ago, and they now exclusively only develop IPv6.
I’m not sure I understand. Perhaps I don’t know enough.
If I have a VPN client with, say, a LAN IP of 10.0.x.x, tunnelled to my network which also uses 10.0.x.x, how can the client machine know which network it’s supposed to be taking to? How can it handle two geographically separate servers with the same address?