HomeServer -> VPN provider works well, Client -> HomeServer works well, but I cannot connect to the HomeServer when the HomeServer is connected with VPN provider and vice versa. VPN provider config has a no-bind setting set, and both config use different ports.
openvpn --show-adapters shows:
Code: Select all
OpenVPN_Server' {F12DAEDB-2D70-440D-9B5D-35E3935EDAFD}
'OpenVPN_Client' {D79D14E4-FEE1-4AF0-8467-BD96587BB07C}
Code: Select all
dev-node {F12DAEDB-2D70-440D-9B5D-35E3935EDAFD}
Code: Select all
TAP-WIN32 device [<VPN_config_filename>] opened: \\.\Global\{883E0867-7F03-409F-B60C-1949E0378AE8}.tap
I've tried to turn off Windows firewall completely, but doesn't work. I've tried a different VPNconfig/provider, but same thing happens.
In addition, I've noticed that I cannot RDP via my external IP when the VPN client is connected, while I can when it is disconnected. It appears the VPN client is blocking incoming connections somehow.
I assume it's some kind of routing issue, but I'm too noob to understand what it may be...
VPN Windows Server config:
Code: Select all
mode server
tls-server
port 6667
;proto tcp
proto udp
;dev tap
dev tun
dev-node {F12DAEDB-2D70-440D-9B5D-35E3935EDAFD}
ca "C:\\Program Files\\OpenVPN\\config\\ca.crt"
cert "C:\\Program Files\\OpenVPN\\config\\server.crt"
key "C:\\Program Files\\OpenVPN\\config\\server.key"
dh "C:\\Program Files\\OpenVPN\\config\\dh2048.pem"
server 10.8.0.0 255.255.255.0
ifconfig-pool-persist ipp.txt
push "route 10.0.42.0 255.255.255.0"
client-to-client
keepalive 10 120
tls-auth "C:\\Program Files\\OpenVPN\\config\\ta.key" 0 # This file is secret
cipher AES-256-CBC
persist-key
persist-tun
status openvpn-status.log
verb 3
explicit-exit-notify 1
Code: Select all
client
dev tun
proto udp
remote xxx.xxx.xxx.xxx
resolv-retry infinite
nobind
persist-key
persist-tun
remote-cert-tls server
cipher AES-256-CBC
comp-lzo no
verb 3
explicit-exit-notify 5
rcvbuf 262144
sndbuf 262144
<ca>
-----BEGIN CERTIFICATE-----
-----END CERTIFICATE-----
</ca>
<cert>
-----BEGIN CERTIFICATE-----
-----END CERTIFICATE-----
</cert>
<key>
-----BEGIN RSA PRIVATE KEY-----
-----END RSA PRIVATE KEY-----
</key>
key-direction 1
<tls-auth>
#
# 2048 bit OpenVPN static key
#
-----BEGIN OpenVPN Static key V1-----
-----END OpenVPN Static key V1-----
</tls-auth>
I'd really appreciate any help!