Client unable to ping VPN Server - Need Routing Help
Posted: Sat Apr 27, 2013 5:35 pm
Greetings,
I have installed OpenVPN 2.1.0 on Ubuntu Server 10.04 and OpenVPN 2.2.1 on client Xubuntu 12.04. While the VPN connects and reports without errors in the log, only the Server can ping and ssh to Clients VPN ip. Clients can NOT ping Server VPN ip.
I am sure the problem is related to proper routing, which I have not been able to fully grasp, even after readed a great number of samples, explanations, tutorials, and forums.
I see some forums describe adding additional routing instructions to the Server.conf or to the client's ccd file, while others use iptables directly. Can you please assist me in the proper routing setup? I want be able to ping Server VPN ip from Client and Client VPN ip from Server.
Thanks,
Paul
IPs:
Tests:
Server Config:
Server ccd for CLIENT-NAME:
Net forwarding on Server:
Client Config:
Net forwarding on Client:
I have installed OpenVPN 2.1.0 on Ubuntu Server 10.04 and OpenVPN 2.2.1 on client Xubuntu 12.04. While the VPN connects and reports without errors in the log, only the Server can ping and ssh to Clients VPN ip. Clients can NOT ping Server VPN ip.
I am sure the problem is related to proper routing, which I have not been able to fully grasp, even after readed a great number of samples, explanations, tutorials, and forums.
I see some forums describe adding additional routing instructions to the Server.conf or to the client's ccd file, while others use iptables directly. Can you please assist me in the proper routing setup? I want be able to ping Server VPN ip from Client and Client VPN ip from Server.
Thanks,
Paul
IPs:
Code: Select all
Server public ip: pu.bl.ic.165 255.255.255.248
Server's network: pu.bl.ic.160/29
Server VPN ip: 172.16.32.1 255.255.255.255
Server VPN ptp: 172.16.32.2 255.255.255.255
Server VPN network: 172.16.32.0/32
Client lan ip: 192.168.1.152 255.255.255.0
Client network: 192.168.1.0/24
Client VPN ip: 172.16.32.6 255.255.255.255
Client VPN ptp: 172.16.32.5 255.255.255.255
Client VPN network: 172.16.32.4/32
Tests:
Code: Select all
Server ping (own) public ip: Good
Server ping (own) VPN ip: Good
Server ping (own) ptp: NO
Server ping Client lan ip: NO
Server ping Client VPN ip: Good
Server ping Client ptp: NO
Client ping Server public ip: Good
Client ping Server VPN ip: NO << Want to fix this one
Client ping Server ptp: NO
Client ping (own) lan ip: Good
Client ping (own) VPN ip: Good
Client ping (own) ptp: NO
Code: Select all
port 1194
proto udp
dev tun
ca ca.crt
cert SERVER-NAME.crt
key SERVER-NAME.key
dh dh1024.pem
server 172.16.32.0 255.255.255.0
ifconfig-pool-persist VPN-NAME.txt
client-to-client
keepalive 10 120
tls-auth ta.key 0
cipher AES-256-CBC
tls-cipher AES256-SHA
engine aesni
comp-lzo
max-clients 100
user nobody
group nogroup
persist-key
status /var/log/openvpn/VNP-NAME-status.log
log-append /var/log/openvpn/openvpn.log
verb 3
mute 20
Code: Select all
ifconfig-push 172.16.32.6 172.16.32.5
Code: Select all
cat /proc/sys/net/ipv4/ip_forward
1 ENABLED
Code: Select all
client
dev tun
proto udp
remote vpn.SERVER-NAME.com 1194
ca ca.crt
cert CLIENT-NAME.crt
key CLIENT-NAME.key
resolv-retry infinite
nobind
persist-key
persist-tun
ns-cert-type server
tls-auth ta.key 1
cipher AES-256-CBC
tls-cipher AES256-SHA
#engine aesni -- no longer available
engine rsax
comp-lzo
user nobody
group nogroup
verb 3
mute 20
Code: Select all
sysctl net | grep ip_forward
net.ipv4.ip_forward = 1 ENABLED