redirect-gateway def1 apparently ignored
Posted: Sat Jun 30, 2018 7:43 pm
Hi everyone. I'm rather new to OpenVPN, I have been using it for 10 months and in that period I wasn't able to solve an issue I'm facing.
The configuration:
I'm running an OpenVPN server on my Synology NAS.
My clients are:
Both the devices can connect to the VPN without any error appearing in the log.If I browse the web the external IP shown is the one of my server, as I expected.
During the day I have to connect to a wireless network wich is behind a firewall wich filters many of the connections. The clients are able to connect to my VPN and when surfing the web, the external IP is again the one of the VPN server.
The problem:
I have a synchronization app/software called Synology Drive which takes care of updating some shared folders among all my electronic devices. This software normally does not work under the mentioned wifi network because the firewall.
Connecting the phone to the VPN the app is able to connect to the cloud server and everything works like charm.
When I try to do the same with my laptop the connection doesn't start and it looks like the firewall is blocking it.
Tests done:
I've tried to do some tests on other wifi networks on which it's not running a firewall. Synology Drive is able to connect to the server, also if the VPN is connected.
The setup:
I was sure that with the lines :
I was forcing all the network traffic on the VPN (even if on the same network of my VPN),apparently this is not so.... Why am I wrong?
Are the packets I'm sending effectively encrypted?
Any help/hint/suggestion is appreciated, thank you!
The configuration:
I'm running an OpenVPN server on my Synology NAS.
My clients are:
- A laptop running Windows 10 and the 2.4.6 version of OpenVPN
- An android phone with 3.0.5 client app version.
Both the devices can connect to the VPN without any error appearing in the log.If I browse the web the external IP shown is the one of my server, as I expected.
During the day I have to connect to a wireless network wich is behind a firewall wich filters many of the connections. The clients are able to connect to my VPN and when surfing the web, the external IP is again the one of the VPN server.
The problem:
I have a synchronization app/software called Synology Drive which takes care of updating some shared folders among all my electronic devices. This software normally does not work under the mentioned wifi network because the firewall.
Connecting the phone to the VPN the app is able to connect to the cloud server and everything works like charm.
When I try to do the same with my laptop the connection doesn't start and it looks like the firewall is blocking it.
Tests done:
I've tried to do some tests on other wifi networks on which it's not running a firewall. Synology Drive is able to connect to the server, also if the VPN is connected.
The setup:
Code: Select all
dev tun
tls-client
remote ******:****
redirect-gateway local def1
redirect-gateway def1
dhcp-option DNS 208.67.222.222
dhcp-option DNS 208.67.220.220
pull
proto udp
script-security 2
remote-cert-tls server
comp-lzo
reneg-sec 0
cipher AES-256-CBC
auth SHA512
auth-user-pass
<ca>
-----BEGIN CERTIFICATE-----
*********************************
*********************************
*********************************
*********************************
-----END CERTIFICATE-----
</ca>
Code: Select all
redirect-gateway local def1
redirect-gateway def1
I was forcing all the network traffic on the VPN (even if on the same network of my VPN),apparently this is not so.... Why am I wrong?
Are the packets I'm sending effectively encrypted?
Any help/hint/suggestion is appreciated, thank you!