Thanks i wasnt sure what to do. i appreciate that you gave me the location of what i was looking for
i implemented
iptables -t nat -A POSTROUTING -s 192.168.10.0/24 -o eth0 -j MASQUERADE
push "redirect-gateway def1"
push "dhcp-option DNS 8.8.8.8"
but i cant get internet access with push "redirect-gateway def1" enabled
i figure as long as i can connect to my lan then im happy as i can use my PIA VPN if i require so gave up on this one.
my phone is connected via OpenVPN Connect to the OpenVPN server running on my router
i followed that
by using
push "route 10.66.0.0 255.255.255.0"
and enabled IP and TUN/TAP forwarding (the links didnt work but after a quick google worked out what i needed
and seems to work. i can connect to the few devices i have tried to
using WOL doesn't seem to work but i have found a workaround for that by accessing it from my router menu.
TinCanTech wrote:
B-Man wrote:i'm running these rules copied from someone else with my subnet but still not able to connect to lan clients
Bad idea .. always do it yourself then you understand what you are doing a little better.
i know i shouldn't but couldn't really find much info as i wasn't really sure what i was looking for. i figured if it worked then bonus but it didn't. i did start to workout what some of the rules were tho
TinCanTech wrote:
B-Man wrote:iptables -t nat -A POSTROUTING -s 192.168.10.0/24 -j MASQUERADE
The recommended command is:
Code: Select all
iptables -t nat -A POSTROUTING -s {vpn subnet} -o {output interface} -j MASQUERADE
where {vpn subnet} is (in your case) 192.168.10.0/24
and {output interface} is probably eth0 but you should verify that yourself.
i used eth0 and seems to work.
how do i know what to use? my bridging shows br0 no vlan1 eth1
either way i seem to have setup the main part of what i was after so thank you very much for your guidance