User Tools

Site Tools


openvpn:routing_from_server_to_client

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
openvpn:routing_from_server_to_client [2021/01/04 22:14] peteropenvpn:routing_from_server_to_client [2021/01/04 22:26] (current) peter
Line 14: Line 14:
 net.ipv4.ip_forward=1 net.ipv4.ip_forward=1
 </file> </file>
- 
----- 
  
 ---- ----
Line 70: Line 68:
 If OpenVPN receives traffic on the tun adapter for those IPs, it doesn’t know which connected client should receive the packets and so it drops them. If OpenVPN receives traffic on the tun adapter for those IPs, it doesn’t know which connected client should receive the packets and so it drops them.
  
-You will also need **iroutes** for those networks in the client configuration directives for your client;+You will also need **iroutes** for those networks in the client configuration directives for your client.
  
 <file bash /etc/config/openvpn> <file bash /etc/config/openvpn>
Line 85: Line 83:
 ===== Testing ===== ===== Testing =====
  
-Ping one of the routes you’ve added.+Check that you can ping one of the routes you’ve added.
  
 <code bash> <code bash>
Line 92: Line 90:
  
 <WRAP info> <WRAP info>
-**NOTE:**  If it works, great!+**NOTE:**  If the ping works:
  
-If not, the first thing to check is that the traffic is actually getting routed.+  * This tells you that packets are hitting your server (which could be the router), being redirected into OpenVPN. 
 +  * OpenVPN is passing them down the tunnel and they’re breaking out at the tun interface on your client. 
 +    * If you don’t see the packets landing on the tun interface: 
 +      * Check your firewall log on the client and make sure your firewall rules are fine. 
 +      * Check the logs on your server (router).
  
-Examine the routers routing table with ‘route’ and see if the route is listed.+If the ping fails:
  
-Assuming it is, on your client end, run the following+  * Check that the traffic is actually getting routed. 
- +  * Examine the routing table on the server (which could be the router) and see if the route is listed. 
-<code bash>+    * Assuming it is, on your client end, run the following<code bash>
 tcpdump -i tun0 tcpdump -i tun0
 </code> </code>
 +  * If packets are being dropped, examine **/tmp/openvpn.status** and make sure that the route is listed in the OpenVPN routing table.
  
 </WRAP> </WRAP>
  
-<WRAP info> 
-**NOTE:  When trying to ping, you should see packets land. 
- 
-If you do, this tells you that packets are hitting your router, being redirected into OpenVPN. 
- 
-OpenVPN is passing them down the tunnel and they’re breaking out at the tun interface on your client. 
- 
-Check your firewall log on the client and make sure your firewall rules are fine. 
- 
-If you don’t see the packets landing on the tun interface, check the logs on your router. 
- 
-If there are complaints about packets being dropped, examine /tmp/openvpn.status and make sure that the route is listed in the OpenVPN routing table. 
-</WRAP> 
  
openvpn/routing_from_server_to_client.1609798445.txt.gz · Last modified: 2021/01/04 22:14 by peter

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki