I'm having some issues using my OpenVPN configuration.
Here is the configuration (which is the tricky part) :
User@home => Firewall/Router A => OpenVPN Server => Firewall/Router A => Company networks.
To access the company networks, I have to use the Firewall A Ip address which is 192.168.150.254.
I'm pushing to my clients the 192.168.150.0 network, hoping that would give them access to my network.
I tried using the ethernet bridging, the tap and tun connections, I checked the /proc/sys/net/ipv4/conf/*/forwarding settings, and lately I tried putting my openvpn server IP address to the same subnet, without success.
The best configuration I had was being able to ping the two addresses on the server from the client, his real one which was 192.168.100.x and the virtual one : 192.168.150.1
I also tried using topology subnet and not using it, and pushing a route to the gateway/32.
I don't wanna push a default gateway, I only want my VPN to be used to access my company networks, nothing else.
Help :'(
server.conf wrote:Code: Select all
port 1194 proto udp dev tun0 ca ca.crt cert openvpn.crt key openvpn.key # This file should be kept secret dh dh1024.pem server 192.168.150.0 255.255.255.0 topology subnet ifconfig-pool-persist ipp.txt push "route 192.168.0.0 255.255.255.0" push "route 192.168.2.0 255.255.255.0" push "route 192.168.100.0 255.255.255.0" push "route 192.168.133.0 255.255.255.0" push "dhcp-option DNS 192.168.2.2" push "dhcp-option DNS 192.168.100.4" client-to-client keepalive 10 120 comp-lzo user nobody group nogroup persist-key persist-tun status openvpn-status.log log openvpn.log log-append openvpn.log verb 6
client.conf wrote:Code: Select all
client dev tun proto tcp remote mycompany.com 1194 resolv-retry infinite nobind persist-key persist-tun ca ca.crt cert mycertificate.crt key mykey.key ns-cert-type server comp-lzo verb 3