My goal is to connect to a samba server on a pc behind the openvpn server (subnet 192.168.1.0).
The openvpn server is on CentOS, and I am using openvpn 2.0.9-1 .
The openvpn client (netbook, WinXP) connects to internet thru a mobile (bluetooth + gprs)
I can ping and visit http server in the same subnet.
What I think I do correctly:
The two conf files below are very much the standard one. Besides, I have
- run "echo 1 > /proc/sys/net/ipv4/ip_forward" on the openvpn server
- set a static route 10.8.0.0 to the openvpn server on my Tomato-router (gateway of the 192.subnet)
- update smb.conf so that 10.8.0.0/24 is included under "hosts allow"
- update iptables & /etc/hosts.allow of the samba pc
- update iptables of the openvpn server by "iptables -A INPUT -i tun+ -j ACCEPT"
- update iptables of the openvpn server by "iptables -A FORWARE -i tun+ -j ACCEPT"
What I don't understand:
When I run "net use z: \\192.168.1.2\sharename /USER:myusername" from a command prompt window, I get the following message on the server log
Code: Select all
Sat Dec 25 22:56:16 2010 client1/123.136.11.171:32154 MULTI: bad source address from client [10.55.171.180], packet dropped
123.136.11.171, as find by a WhoIs site, belongs to my ISP !?!
Is it kind of scenario that standard openvpn setting not cater for?
I am lacking idea where and how to move on.

Thanks in advance for your help.
server.conf
Code: Select all
port 1194
proto udp
dev tun
ca ca.crt
cert ovpnsrv1.crt
key ovpnsrv1.key # This file should be kept secret
dh dh1024.pem
server 10.8.0.0 255.255.255.0
ifconfig-pool-persist ipp.txt
push "route 192.168.1.0 255.255.255.0"
push "redirect-gateway def1"
keepalive 10 120
comp-lzo
persist-key
persist-tun
status openvpn-status.log
verb 3
Code: Select all
client
dev tun
proto udp
remote ip-of-tomato-router 1194
resolv-retry infinite
nobind
persist-key
persist-tun
ca ca.crt
cert client1.crt
key client1.key
ns-cert-type server
comp-lzo
verb 3