OpenVPN Real Public IP By tun Client

Need help configuring your VPN? Just post here and you'll get that help.
Forum rules
Please use the [oconf] BB tag for openvpn Configurations. See viewtopic.php?f=30&t=21589 for an example.
Post Reply
armanrizve
OpenVpn Newbie
Posts: 1
Joined: Mon Oct 07, 2019 10:41 pm

OpenVPN Real Public IP By tun Client

Post by armanrizve » Tue Oct 08, 2019 1:51 pm

Dear,
All Viewers, I want to use OpenVPN Hosting Server Real Public IP by OpenWRT/DD-WRT OpenVPN client using TUN(Routing) Mode, I can purchase IP from my hosting provider as much as I want, I want those IP assign for my OpenVPN Tun Client side PCs, like OpenWRT Router has 5 RJ45 Port 1 WAN left 4 is LAN so LAN will be use for using Real Public IP of OpenVPN Hosting Server.

Example I have 3 OpenVPN clients & 6 Extra IP I want to assign 2 IPs for each client & only which IP I assign those can be used by that client not other IPs & also want to control each IP maximum Bandwidth.

I am sure concept is clear for experts, I have also attach diagram, below is my current server & client conf its connected & can ping each other, but if I try to use server ISP public IP, not working & also not pinging from server or client, hope someone able to help me, T.I.A

Code: Select all

Server Conf:

Code: Select all

mode server
port 1980
proto udp
dev tun

ca /etc/openvpn/ca.crt
cert /etc/openvpn/server.crt
key /etc/openvpn/server.key
dh /etc/openvpn/dh2048.pem
tls-auth /etc/openvpn/ta.key 0
client-config-dir /etc/openvpn/static-ip

server 192.168.3.0 255.255.255.0
push "dhcp-option DNS 8.8.8.8"
push "dhcp-option DNS 8.8.4.4"
push "redirect-gateway"
client-to-client
keepalive 10 120
cipher AES-128-CBC
auth SHA256
user nobody
group nobody
comp-lzo
persist-key
persist-tun
status /etc/openvpn/openvpn-status.log
verb 3
Client Conf:

Code: Select all

client
remote 116.203.94.15 1980
proto udp
dev tun
cipher AES-128-CBC
resolv-retry infinite
ns-cert-type server
key-direction 1
auth SHA256
nobind
persist-key
persist-tun
comp-lzo
verb 3

<ca>
-----BEGIN CERTIFICATE-----
MIIFADCCA+igAwIBAgIJAL/Y8eb+0AP7MA0GCSqGSIb3DQEBCwUAMIGwMQswCQYD
VQQGEwJCRDEMMAoGA1UECBMDQ1RHMRAwDgYDVQQHEwdBZ3JhYmFkMRMwEQYDVQQK
EwpWUE4tV29ybGRzMRkwFwYDVQQLExBHYXRld2F5T25saW5lVlBOMRYwFAYDVQQD
Ew1WUE4tV29ybGRzIENBMRMwEQYDVQQpEwpWUE4tV29ybGRzMSQwIgYJKoZIhvcN
-----END CERTIFICATE-----
</ca>

<cert>
-----BEGIN CERTIFICATE-----
AwIwCwYDVR0PBAQDAgeAMA0GCSqGSIb3DQEBCwUAA4IBAQCVletgXq8PLq8OtDpg
bNVqKGlIWCcBt3ApLG2dUTqxIgyZ80eT4Dj7mTfO69F4wBBiPs+rcekG8K78T5nD
K3XrsqVlKKb3MhByYAygNy7NrUxL2zBpAJXuiFtutT3VgBWQ+Xz2DBRzTkhCstG8
xDkkc5NY9Q53RitPtGrR3Id3pIGrZPQJfz1YjmUPsofkcc+ATZnqkjqASlDR2q/0
yvcNF0bXM1+T9UP5WEn4ZRicoj6gwnZ0Vr7u3TFsQHkAO6NvtiV/5Lu5loIpz2fJ
T+/QxharYF/s77mbbBptVbLSv8kU4ByOq1dd3swW/7GTtDDWG5VQoBXKorOy20lr
-----END CERTIFICATE-----
</cert>

<key>
-----BEGIN PRIVATE KEY-----
MIIEvgIBADANBgkqhkiG9w0BAQEFAASCBKgwggSkAgEAAoIBAQCc77hpt/nsyI3s
nDsg9GUKEMZ4F5AQQO3j65qWde9HHCVcyrOLaNMugXfUFC0Acz6ukm6CNPs6u0J9
iNxFYtZK+mLdfDiKkz+yqhZp/F3E9ccmHANvUhPCWyrkBgKqAOZ2brfhb4WTUj6E
ZWD+tcWwab+5EsiTj7tN8JG0e+cqNPbe5VDiRsgBt3wjR4oATov51k7yOUxVyBpl
Fw+fQbLUCoPTJPF5f+zkpaj/PsKM/4JdkjPmky968OycYuf4vO+Uu9HuHn2PTwVE
-----END PRIVATE KEY-----
</key>

<tls-auth>
#
# 2048 bit OpenVPN static key
#
-----BEGIN OpenVPN Static key V1-----
3105d2ba9d5c1ce0d79616c40999756c
fa72772f1b49c0bc9d8f279b140a5628
8ea0dc1cf676deab939537b1ae627809
2db307d0fdfc12477ed490d59bed2f54
b63554d90850f436e2acb64110236e25
f6f794daa7b67847fb6f98fa4e971287
-----END OpenVPN Static key V1-----
</tls-auth>

Here is Diagram:

Image

Post Reply