Tunnel OpenVPN Through Sonicwall
Posted: Thu Sep 03, 2015 4:24 pm
I have set up OpenVPN on Server and Client.
I am able to connect to Server via OpenVPN inside the LAN.
I am unable to connect to Server via OpenVPN outside LAN (WAN).
I am confident that my Client files are set up correctly.
However, my Server Config file "remote my-server-1 1194" is in question.
I have this set to "remote <Server Private IP> 1194" and Client connects with Server from inside LAN but not from WAN.
If I change it to "remote <Server Public IP> 1194" Client does not connect to Server from inside LAN nor from WAN.
Which IP should this be?
Server Public IP?
Server Private IP?
Other?
Sonicwall Firewall Settings
Services
->Name: OpenVPN Port 1194
->Protocol: UDP
->Port Range: 1194-1194
->Sub Type: None
NAT Policy
->Original Source: Any
->Translated Source: Original
->Original Destination: <Public Server IP>
->Translation Destination: <Private Server IP>
->Original Service: OpenVPN Port 1194
->Inbound Interface: Any
->Outbound Interface: Any
->Enable NAT Policy <CHECKED>
Access Rules
->Action: ALLOW
->From: WAN
->To: LAN
->Source Port: OpenVPN Port 1194 <SERVICE>
->Service: OpenVPN Port 1194
->Source: Any
->Destination: <Public Server IP>
->Users Included: All
->Users Excluded: None
->Schedule: Always on
->Enable Logging <CHECKED>
->Allow Fragmented Packets <CHECKED>
->Enable Geo-IP Filter <CHECKED>
->Enable Botnet Filter <CHECKED>
Thanks for spending time with this.
I am able to connect to Server via OpenVPN inside the LAN.
I am unable to connect to Server via OpenVPN outside LAN (WAN).
I am confident that my Client files are set up correctly.
However, my Server Config file "remote my-server-1 1194" is in question.
I have this set to "remote <Server Private IP> 1194" and Client connects with Server from inside LAN but not from WAN.
If I change it to "remote <Server Public IP> 1194" Client does not connect to Server from inside LAN nor from WAN.
Which IP should this be?
Server Public IP?
Server Private IP?
Other?
Sonicwall Firewall Settings
Services
->Name: OpenVPN Port 1194
->Protocol: UDP
->Port Range: 1194-1194
->Sub Type: None
NAT Policy
->Original Source: Any
->Translated Source: Original
->Original Destination: <Public Server IP>
->Translation Destination: <Private Server IP>
->Original Service: OpenVPN Port 1194
->Inbound Interface: Any
->Outbound Interface: Any
->Enable NAT Policy <CHECKED>
Access Rules
->Action: ALLOW
->From: WAN
->To: LAN
->Source Port: OpenVPN Port 1194 <SERVICE>
->Service: OpenVPN Port 1194
->Source: Any
->Destination: <Public Server IP>
->Users Included: All
->Users Excluded: None
->Schedule: Always on
->Enable Logging <CHECKED>
->Allow Fragmented Packets <CHECKED>
->Enable Geo-IP Filter <CHECKED>
->Enable Botnet Filter <CHECKED>
Thanks for spending time with this.