Example: Connection to the server over NoIP.com DDNS service, remote LAN IP class= 192.168.10.xxx
On the remote Laptop I can't ping (example address) 192.168.10.25!!!
Hereby in annex the server and client config file, please it would be really appreciated if someone might help me to understand how to make it working.
SERVER CONF:
Code: Select all
# OpenVPN - Porte, Protocollo, e Tun
port 1194
proto udp
dev tun
# OpenVPN - Certificato Server, CA, e key
ca /etc/openvpn/server/ca.crt
cert /etc/openvpn/server/raspy_vpn.crt
key /etc/openvpn/server/raspy_vpn.key
# Chiave DH
dh /etc/openvpn/server/dh.pem
# Configurazione di rete - Network Interna
server 10.8.0.0 255.255.255.0
# Decommenta questa riga per redirige tutte le connessioni attraverso il server OpenVPN
push "redirect-gateway def1"
# Configurazione DNS - Usiamo quelli di Google
push "dhcp-option DNS 8.8.8.8"
push "dhcp-option DNS 8.8.4.4"
#Permetti la connessioni di client multipli con la stessa chiave
duplicate-cn
# Sicurezza TLS
cipher AES-256-CBC
tls-version-min 1.0
tls-cipher TLS-DHE-RSA-WITH-AES-256-GCM-SHA384:TLS-DHE-RSA-WITH-AES-256-CBC-SHA256:TLS-DHE-RSA-WITH-AES-128-GCM-SHA256:TLS-DHE-RSA-WITH-AES-128-CBC-SHA256
auth SHA512
auth-nocache
# Altro
keepalive 20 60
persist-key
persist-tun
compress lz4-v2
daemon
user nobody
group nogroup
# Log
log-append /var/log/openvpn.log
verb 3
Code: Select all
client
dev tun
proto udp
remote xxx.xxx.xxx.xxx 1194
cipher AES-256-CBC
auth SHA512
auth-nocache
tls-version-min 1.0
tls-cipher TLS-DHE-RSA-WITH-AES-256-GCM-SHA384:TLS-DHE-RSA-WITH-AES-256-CBC-SHA256:TLS-DHE-RSA-WITH-AES-128-GCM-SHA256:TLS-DHE-RSA-WITH-AES-128-CBC-SHA256
resolv-retry infinite
compress lz4-v2
nobind
persist-key
persist-tun
mute-replay-warnings
verb 3
<ca>
-----BEGIN CERTIFICATE-----
-----END CERTIFICATE-----
</ca>
<cert>
-----BEGIN CERTIFICATE-----
-----END CERTIFICATE-----
</cert>
<key>
-----BEGIN ENCRYPTED PRIVATE KEY-----
-----END ENCRYPTED PRIVATE KEY-----
</key>