Hi,
I'm migrating an old OpenVPN server (up and running now) to a new virtual machine with an updated configuration. The main difference (apart from debian and openvpn versions) is that the old one used the default topology net30 and trafic was masqueraded behind the server address, and the new one uses topology subnet and trafic is routed through the server keeping the addresses from each client within the vpn.
The server is running on a (Proxmox) VM behind the firewall, and I have an isolated VLAN from the server to the firewall so I can control also what comes in from the VPN to our serveral internal networks. Although I also have enabled a default route through the firewall and outgoing trafic is allowed, we usually configure the client to only route local traffic through the VPN and use its own default route to the internet.
The other difference in the old server was that instead of an isolaged VLAN, we had a physical cable running from the Proxmox server running the VM to the firewall.
Now, the problem I have is that I connect to the VPN but I can't reach pass the server even when routes are pushed, ip forwarding enabled in the kernel and allowed in netfilter.
I checked using tcpdump in the openvpn server and I see the traffic coming in through tun0 but not going out on ens19 (so it is not a problem with my external firewall).
This is openvpn 2.6.3 running on debian 12.
Here's the server configuration file:
[oconf=Server Config]# This is a comment
Here's the server configuration file:
(imagine the path in log-append... there is a big problem with the forum, I can't evn type the path without getting the 403 error)
I'm migrating an old OpenVPN server (up and running now) to a new virtual machine with an updated configuration. The main difference (apart from debian and openvpn versions) is that the old one used the default topology net30 and trafic was masqueraded behind the server address, and the new one uses topology subnet and trafic is routed through the server keeping the addresses from each client within the vpn.
The server is running on a (Proxmox) VM behind the firewall, and I have an isolated VLAN from the server to the firewall so I can control also what comes in from the VPN to our serveral internal networks. Although I also have enabled a default route through the firewall and outgoing trafic is allowed, we usually configure the client to only route local traffic through the VPN and use its own default route to the internet.
The other difference in the old server was that instead of an isolaged VLAN, we had a physical cable running from the Proxmox server running the VM to the firewall.
Now, the problem I have is that I connect to the VPN but I can't reach pass the server even when routes are pushed, ip forwarding enabled in the kernel and allowed in netfilter.
I checked using tcpdump in the openvpn server and I see the traffic coming in through tun0 but not going out on ens19 (so it is not a problem with my external firewall).
This is openvpn 2.6.3 running on debian 12.
Here's the server configuration file:
[oconf=Server Config]# This is a comment
Here's the server configuration file:
Code:
mode server tls-server dev tun server 172.71.1.0 255.255.255.0 topology subnet proto udp port 1194 cipher AES-256-CBC #verify-client-cert optional ca /etc/openvpn/keys/ca.crt cert /etc/openvpn/keys/server.crt key /etc/openvpn/keys/server.key dh /etc/openvpn/keys/dh.pem keepalive 10 120 push "route 172.27.100.0 255.255.255.0" push "route 172.27.101.0 255.255.255.0" # En VPN infra agregamos más rutas # VPN users vieja GW push "route 172.29.30.0 255.255.255.252" # VPN-USERS-LEGACY-GW push "route 172.72.0.0 255.255.255.252" # VPN-USERS-LEGACY-LAN push "route 172.72.1.0 255.255.255.0" push "dhcp-option DNS 172.27.101.101" push "dhcp-option DOMAIN siu.edu.ar" push "dhcp-option DOMAIN cin.edu.ar" #Habilitar puerto para interfaz administrativa 17562 management 0.0.0.0 17562 log-append .../openvpn.log verb 3
Comment