How to allow the client to access the server lan side?,
I was able to do this when I had openvpn server running on windows by enabling Internet Connection Sharing.
I tried configuring the /etc/config/firewall to masquerade the vpn, but it has no effect.
So far this is what I tried:
/etc/config/firewall
Server:
Client:
I was able to do this when I had openvpn server running on windows by enabling Internet Connection Sharing.
I tried configuring the /etc/config/firewall to masquerade the vpn, but it has no effect.
So far this is what I tried:
- The OpenVpnClient can connect to the openvpnserver.
- Client and server can ping each other.
- Client can't ping LanDevice 192.168.29.50.
- Wireshark on 192.168.29.50 shows packets from 10.8.0.2.
- Response from 192.168.29.50 is not showing at 10.8.0.2
/etc/config/firewall
Code:
config zone 'vpn' option name 'vpn' option input 'ACCEPT' option forward 'ACCEPT' option output 'ACCEPT' option masq '1' option mtu_fix '1' option network 'vpn' config forwarding 'vpn_forwarding_lan_in' option src 'vpn' option dest 'lan' config forwarding 'vpn_forwarding_lan_out' option src 'lan' option dest 'vpn'
Code:
OpenVpnClient 10.8.0.2 MainRouter 192.168.29.1 Openwrt 192.168.29.158 with OpenVpnServer 10.8.0.1 LanDevice 192.168.29.50
Code:
port 443 proto tcp4 dev tun tcp-queue-limit 256 ca "/ca.crt" cert "/server.crt" key "/server.key" dh "/dh1024.pem" topology subnet server 10.8.0.0 255.255.255.0 push "route 192.168.29.0 255.255.255.0" push "route 8.8.8.8 255.255.255.255" client-to-client keepalive 10 120 mode server tls-server cipher AES-128-CBC data-ciphers AES-128-CBC auth SHA256 persist-key persist-tun status "/tmp/openvpn-status.log" log "/tmp/openvpn.log" log-append "/tmp/openvpn.log" verb 3
Code:
client dev tun proto tcp remote server.com 666 resolv-retry infinite nobind persist-key persist-tun remote-cert-tls server cipher AES-128-CBC auth SHA256 tls-client verb 3 <ca> ....
Comment