[Solved]Cant connect via external ip but only internal IP

Need help configuring your VPN? Just post here and you'll get that help.

Moderators: TinCanTech, TinCanTech, TinCanTech, TinCanTech, TinCanTech, TinCanTech

Forum rules
Please use the [oconf] BB tag for openvpn Configurations. See viewtopic.php?f=30&t=21589 for an example.
Post Reply
blackndwhite
OpenVpn Newbie
Posts: 3
Joined: Sun Oct 25, 2015 11:41 pm

[Solved]Cant connect via external ip but only internal IP

Post by blackndwhite » Mon Oct 26, 2015 12:42 am

Hey guys,

so I installed OpenVPN on my raspberryPi today and so far I could troubleshoot everything by my own. :D
But now I cannot see my error. :(

My server conf looks like this:

Code: Select all

local 192.168.2.201
dev tun
proto udp
port 1194
ca /etc/openvpn/easy-rsa/keys/ca.crt
cert /etc/openvpn/easy-rsa/keys/floriankeys.crt
key /etc/openvpn/easy-rsa/keys/floriankeys.key
dh /etc/openvpn/easy-rsa/keys/dh1024.pem
server 10.8.0.0 255.255.255.0
ifconfig 10.8.0.1 10.8.0.2
push "route 10.8.0.1 255.255.255.255"
push "route 10.8.0.0 255.255.255.0"
push "route 192.168.2.0 255.255.255.0"
push "dhcp-option DNS 192.168.2.1"
push "redirect-gateway def1"
client-to-client
duplicate-cn
keepalive 10 120
tls-auth /etc/openvpn/easy-rsa/keys/ta.key 0
cipher AES-128-CBC
comp-lzo
user nobody
group nogroup
persist-key
persist-tun
status /var/log/openvpn-status.log 20
log /var/log/openvpn.log
verb 4
My device config:

Code: Select all

client
dev tun
proto udp
remote mydomain.duckdns.org 1194
resolv-retry infinite
nobind
persist-key
persist-tun
mute-replay-warnings
ns-cert-type server
key-direction 1
cipher AES-128-CBC
comp-lzo
verb 1
mute 20
<ca>
-----BEGIN CERTIFICATE-----
asdahsdkajshd7k4hHKJH7...
-----END CERTIFICATE-----
</ca>
<cert>
-----BEGIN CERTIFICATE-----
JKHLKHIZWJQWHEJQWHE7HKKJh34763287...
-----END CERTIFICATE-----
</cert>
<key>
-----BEGIN RSA PRIVATE KEY-----
Proc-Type: 4,ENCRYPTED
DEK-Info: DES-EDE3-CBC,492009B58BF2D8F7

JKHKJSHDA786876sadasdjhsak...
-----END RSA PRIVATE KEY-----
</key>
<tls-auth>
#
# 2048 bit OpenVPN static key
#
-----BEGIN OpenVPN Static key V1-----
sdajksdlaksjdlIGJKHGKGjsad7868...
-----END OpenVPN Static key V1-----
</tls-auth>
When I substitute mydomain.duckdns.org with 192.168.2.201 I can connect to the server and I can access the Internet.

Client Output:

Code: Select all

sudo openvpn --config ./Desktop/travelLaptop.ovpn
[sudo] password for sam:
Mon Oct 26 01:13:37 2015 us=231046 Current Parameter Settings:
Mon Oct 26 01:13:37 2015 us=231113 config = './Desktop/travelLaptop.ovpn'
Mon Oct 26 01:13:37 2015 us=231128 mode = 0
Mon Oct 26 01:13:37 2015 us=231141 persist_config = DISABLED
Mon Oct 26 01:13:37 2015 us=231153 persist_mode = 1
Mon Oct 26 01:13:37 2015 us=231165 show_ciphers = DISABLED
Mon Oct 26 01:13:37 2015 us=231178 show_digests = DISABLED
Mon Oct 26 01:13:37 2015 us=231190 show_engines = DISABLED
Mon Oct 26 01:13:37 2015 us=231202 genkey = DISABLED
Mon Oct 26 01:13:37 2015 us=231214 key_pass_file = '[UNDEF]'
Mon Oct 26 01:13:37 2015 us=231226 show_tls_ciphers = DISABLED
Mon Oct 26 01:13:37 2015 us=231238 Connection profiles [default]:
Mon Oct 26 01:13:37 2015 us=231260 proto = udp
Mon Oct 26 01:13:37 2015 us=231272 local = '[UNDEF]'
Mon Oct 26 01:13:37 2015 us=231284 local_port = 0
Mon Oct 26 01:13:37 2015 us=231296 remote = '192.168.2.201'
Mon Oct 26 01:13:37 2015 us=231313 remote_port = 1194
Mon Oct 26 01:13:37 2015 us=231325 remote_float = DISABLED
Mon Oct 26 01:13:37 2015 us=231341 bind_defined = DISABLED
Mon Oct 26 01:13:37 2015 us=231353 bind_local = DISABLED
Mon Oct 26 01:13:37 2015 us=231369 NOTE: --mute triggered...
Mon Oct 26 01:13:37 2015 us=231388 255 variation(s) on previous 20 message(s) suppressed by --mute
Mon Oct 26 01:13:37 2015 us=231403 OpenVPN 2.3.2 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [eurephia] [MH] [IPv6] built on Apr 13 2015
Enter Private Key Password: ********
Mon Oct 26 01:13:42 2015 us=197777 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Mon Oct 26 01:13:42 2015 us=198415 Control Channel Authentication: tls-auth using INLINE static key file
Mon Oct 26 01:13:42 2015 us=198466 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Oct 26 01:13:42 2015 us=198498 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Oct 26 01:13:42 2015 us=198560 LZO compression initialized
Mon Oct 26 01:13:42 2015 us=198675 Control Channel MTU parms [ L:1558 D:166 EF:66 EB:0 ET:0 EL:0 ]
Mon Oct 26 01:13:42 2015 us=198752 Socket Buffers: R=[212992->131072] S=[212992->131072]
Mon Oct 26 01:13:42 2015 us=198803 Data Channel MTU parms [ L:1558 D:1450 EF:58 EB:135 ET:0 EL:0 AF:3/1 ]
Mon Oct 26 01:13:42 2015 us=198849 Local Options String: 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-128-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client'
Mon Oct 26 01:13:42 2015 us=198879 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 0,cipher AES-128-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server'
Mon Oct 26 01:13:42 2015 us=198920 Local Options hash (VER=V4): '272f1b58'
Mon Oct 26 01:13:42 2015 us=198958 Expected Remote Options hash (VER=V4): 'a2e63101'
Mon Oct 26 01:13:42 2015 us=198992 UDPv4 link local: [undef]
Mon Oct 26 01:13:42 2015 us=199034 UDPv4 link remote: [AF_INET]192.168.2.201:1194
Mon Oct 26 01:13:42 2015 us=206954 TLS: Initial packet from [AF_INET]192.168.2.201:1194, sid=a5723428 9f149682
Mon Oct 26 01:13:42 2015 us=283662 VERIFY OK:
Mon Oct 26 01:13:42 2015 us=284021 VERIFY OK: nsCertType=SERVER
Mon Oct 26 01:13:42 2015 us=284063 VERIFY OK: 
Mon Oct 26 01:13:42 2015 us=397171 Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Mon Oct 26 01:13:42 2015 us=397235 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Oct 26 01:13:42 2015 us=397263 Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Mon Oct 26 01:13:42 2015 us=397288 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Oct 26 01:13:42 2015 us=397401 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Mon Oct 26 01:13:42 2015 us=397458 [floriankeys] Peer Connection Initiated with [AF_INET]192.168.2.201:1194
Mon Oct 26 01:13:44 2015 us=585930 SENT CONTROL [floriankeys]: 'PUSH_REQUEST' (status=1)
Mon Oct 26 01:13:44 2015 us=593196 PUSH: Received control message: 'PUSH_REPLY,route 10.8.0.1 255.255.255.255,route 10.8.0.0 255.255.255.0,route 192.168.2.201 255.255.255.0,dhcp-option DNS 192.168.2.1,redirect-gateway def1,route 10.8.0.0 255.255.255.0,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.6 10.8.0.5'
Mon Oct 26 01:13:44 2015 us=593352 OPTIONS IMPORT: timers and/or timeouts modified
Mon Oct 26 01:13:44 2015 us=593388 OPTIONS IMPORT: --ifconfig/up options modified
Mon Oct 26 01:13:44 2015 us=593413 OPTIONS IMPORT: route options modified
Mon Oct 26 01:13:44 2015 us=593436 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Mon Oct 26 01:13:44 2015 us=593659 ROUTE_GATEWAY 192.168.2.1/255.255.255.0 IFACE=wlan0 HWADDR=78:e4:00:6d:bb:c0
Mon Oct 26 01:13:44 2015 us=594175 TUN/TAP device tun0 opened
Mon Oct 26 01:13:44 2015 us=594229 TUN/TAP TX queue length set to 100
Mon Oct 26 01:13:44 2015 us=594268 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Mon Oct 26 01:13:44 2015 us=594352 /sbin/ip link set dev tun0 up mtu 1500
Mon Oct 26 01:13:44 2015 us=598500 /sbin/ip addr add dev tun0 local 10.8.0.6 peer 10.8.0.5
Mon Oct 26 01:13:44 2015 us=607228 /sbin/ip route add 192.168.2.201/32 via 192.168.2.1
Mon Oct 26 01:13:44 2015 us=610945 /sbin/ip route add 0.0.0.0/1 via 10.8.0.5
Mon Oct 26 01:13:44 2015 us=611951 /sbin/ip route add 128.0.0.0/1 via 10.8.0.5
Mon Oct 26 01:13:44 2015 us=615230 /sbin/ip route add 10.8.0.1/32 via 10.8.0.5
Mon Oct 26 01:13:44 2015 us=616219 /sbin/ip route add 10.8.0.0/24 via 10.8.0.5
Mon Oct 26 01:13:44 2015 us=617640 /sbin/ip route add 192.168.2.201/24 via 10.8.0.5
RTNETLINK answers: Invalid argument
Mon Oct 26 01:13:44 2015 us=618822 ERROR: Linux route add command failed: external program exited with error status: 2
Mon Oct 26 01:13:44 2015 us=618905 /sbin/ip route add 10.8.0.0/24 via 10.8.0.5
RTNETLINK answers: File exists
Mon Oct 26 01:13:44 2015 us=619767 ERROR: Linux route add command failed: external program exited with error status: 2
Mon Oct 26 01:13:44 2015 us=619820 Initialization Sequence Completed
/var/log/openvpn.log:

Code: Select all


Mon Oct 26 01:13:42 2015 192.168.2.112:57081 Re-using SSL/TLS context
Mon Oct 26 01:13:42 2015 192.168.2.112:57081 LZO compression initialized
Mon Oct 26 01:13:42 2015 192.168.2.112:57081 [travelLaptop] Peer Connection Initiated with [AF_INET]192.168.2.112:57081
Mon Oct 26 01:13:42 2015 travelLaptop/192.168.2.112:57081 MULTI_sva: pool returned IPv4=10.8.0.6, IPv6=2881:97be:809e:5a7f:34cb:5f7f:94dc:8c80
Mon Oct 26 01:13:44 2015 travelLaptop/192.168.2.112:57081 send_push_reply(): safe_cap=960

But when I use mydomain.duckdns.org to connect to the server:

client out:

Code: Select all

sudo openvpn --config ./Desktop/travelLaptop.ovpn
[sudo] password for sam:
Mon Oct 26 01:34:51 2015 us=918508 Current Parameter Settings:
Mon Oct 26 01:34:51 2015 us=918576 config = './Desktop/travelLaptop.ovpn'
Mon Oct 26 01:34:51 2015 us=918591 mode = 0
Mon Oct 26 01:34:51 2015 us=918604 persist_config = DISABLED
Mon Oct 26 01:34:51 2015 us=918617 persist_mode = 1
Mon Oct 26 01:34:51 2015 us=918629 show_ciphers = DISABLED
Mon Oct 26 01:34:51 2015 us=918641 show_digests = DISABLED
Mon Oct 26 01:34:51 2015 us=918653 show_engines = DISABLED
Mon Oct 26 01:34:51 2015 us=918665 genkey = DISABLED
Mon Oct 26 01:34:51 2015 us=918677 key_pass_file = '[UNDEF]'
Mon Oct 26 01:34:51 2015 us=918698 show_tls_ciphers = DISABLED
Mon Oct 26 01:34:51 2015 us=918710 Connection profiles [default]:
Mon Oct 26 01:34:51 2015 us=918723 proto = udp
Mon Oct 26 01:34:51 2015 us=918735 local = '[UNDEF]'
Mon Oct 26 01:34:51 2015 us=918753 local_port = 0
Mon Oct 26 01:34:51 2015 us=918765 remote = 'kimmes.duckdns.org'
Mon Oct 26 01:34:51 2015 us=918780 remote_port = 1194
Mon Oct 26 01:34:51 2015 us=918791 remote_float = DISABLED
Mon Oct 26 01:34:51 2015 us=918807 bind_defined = DISABLED
Mon Oct 26 01:34:51 2015 us=918820 bind_local = DISABLED
Mon Oct 26 01:34:51 2015 us=918834 NOTE: --mute triggered...
Mon Oct 26 01:34:51 2015 us=918853 255 variation(s) on previous 20 message(s) suppressed by --mute
Mon Oct 26 01:34:51 2015 us=918868 OpenVPN 2.3.2 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [eurephia] [MH] [IPv6] built on Apr 13 2015
Enter Private Key Password: ********
Mon Oct 26 01:34:54 2015 us=968451 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Mon Oct 26 01:34:54 2015 us=969022 Control Channel Authentication: tls-auth using INLINE static key file
Mon Oct 26 01:34:54 2015 us=969082 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Oct 26 01:34:54 2015 us=969133 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Oct 26 01:34:54 2015 us=969226 LZO compression initialized
Mon Oct 26 01:34:54 2015 us=969375 Control Channel MTU parms [ L:1558 D:166 EF:66 EB:0 ET:0 EL:0 ]
Mon Oct 26 01:34:54 2015 us=969472 Socket Buffers: R=[212992->131072] S=[212992->131072]
Mon Oct 26 01:34:55 2015 us=155228 Data Channel MTU parms [ L:1558 D:1450 EF:58 EB:135 ET:0 EL:0 AF:3/1 ]
Mon Oct 26 01:34:55 2015 us=155315 Local Options String: 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-128-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client'
Mon Oct 26 01:34:55 2015 us=155359 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 0,cipher AES-128-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server'
Mon Oct 26 01:34:55 2015 us=155418 Local Options hash (VER=V4): '272f1b58'
Mon Oct 26 01:34:55 2015 us=155470 Expected Remote Options hash (VER=V4): 'a2e63101'
Mon Oct 26 01:34:55 2015 us=155515 UDPv4 link local: [undef]
Mon Oct 26 01:34:55 2015 us=155562 UDPv4 link remote: [AF_INET]xx.xxx.xxx.xx:1194
Mon Oct 26 01:35:55 2015 us=274565 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Mon Oct 26 01:35:55 2015 us=274638 TLS Error: TLS handshake failed
Mon Oct 26 01:35:55 2015 us=274814 TCP/UDP: Closing socket
Mon Oct 26 01:35:55 2015 us=274883 SIGUSR1[soft,tls-error] received, process restarting
Mon Oct 26 01:35:55 2015 us=274933 Restart pause, 2 second(s)
Mon Oct 26 01:35:57 2015 us=275129 Re-using SSL/TLS context
Mon Oct 26 01:35:57 2015 us=275219 LZO compression initialized
Mon Oct 26 01:35:57 2015 us=275328 Control Channel MTU parms [ L:1558 D:166 EF:66 EB:0 ET:0 EL:0 ]
Mon Oct 26 01:35:57 2015 us=275396 Socket Buffers: R=[212992->131072] S=[212992->131072]
Mon Oct 26 01:35:57 2015 us=449651 Data Channel MTU parms [ L:1558 D:1450 EF:58 EB:135 ET:0 EL:0 AF:3/1 ]
Mon Oct 26 01:35:57 2015 us=449746 Local Options String: 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-128-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client'
Mon Oct 26 01:35:57 2015 us=449789 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 0,cipher AES-128-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server'
Mon Oct 26 01:35:57 2015 us=449849 Local Options hash (VER=V4): '272f1b58'
Mon Oct 26 01:35:57 2015 us=449897 Expected Remote Options hash (VER=V4): 'a2e63101'
Mon Oct 26 01:35:57 2015 us=449942 UDPv4 link local: [undef]
Mon Oct 26 01:35:57 2015 us=449991 UDPv4 link remote: [AF_INET]xx.xxx.xxx.xx:1194
Mon Oct 26 01:36:58 2015 us=63270 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Mon Oct 26 01:36:58 2015 us=63316 TLS Error: TLS handshake failed
Mon Oct 26 01:36:58 2015 us=63425 TCP/UDP: Closing socket
Mon Oct 26 01:36:58 2015 us=63466 SIGUSR1[soft,tls-error] received, process restarting
Mon Oct 26 01:36:58 2015 us=63484 Restart pause, 2 second(s)
Mon Oct 26 01:37:00 2015 us=63642 Re-using SSL/TLS context
Mon Oct 26 01:37:00 2015 us=63686 LZO compression initialized
Mon Oct 26 01:37:00 2015 us=63759 Control Channel MTU parms [ L:1558 D:166 EF:66 EB:0 ET:0 EL:0 ]
Mon Oct 26 01:37:00 2015 us=63801 Socket Buffers: R=[212992->131072] S=[212992->131072]
Mon Oct 26 01:37:00 2015 us=234440 Data Channel MTU parms [ L:1558 D:1450 EF:58 EB:135 ET:0 EL:0 AF:3/1 ]
Mon Oct 26 01:37:00 2015 us=234498 Local Options String: 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-128-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client'
Mon Oct 26 01:37:00 2015 us=234517 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 0,cipher AES-128-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server'
Mon Oct 26 01:37:00 2015 us=234546 Local Options hash (VER=V4): '272f1b58'
Mon Oct 26 01:37:00 2015 us=234564 Expected Remote Options hash (VER=V4): 'a2e63101'
Mon Oct 26 01:37:00 2015 us=234579 UDPv4 link local: [undef]
Mon Oct 26 01:37:00 2015 us=234593 UDPv4 link remote: [AF_INET]xx.xxx.xxx.xx:1194

server log:

Code: Select all

Mon Oct 26 01:34:08 2015 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Mon Oct 26 01:34:19 2015 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Mon Oct 26 01:34:29 2015 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Mon Oct 26 01:34:39 2015 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Mon Oct 26 01:34:49 2015 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Mon Oct 26 01:34:59 2015 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Mon Oct 26 01:35:09 2015 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Mon Oct 26 01:35:19 2015 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Mon Oct 26 01:35:29 2015 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Mon Oct 26 01:35:40 2015 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Mon Oct 26 01:35:50 2015 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Mon Oct 26 01:36:00 2015 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Mon Oct 26 01:36:10 2015 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Mon Oct 26 01:36:20 2015 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Mon Oct 26 01:36:30 2015 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Mon Oct 26 01:36:40 2015 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Mon Oct 26 01:36:50 2015 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Mon Oct 26 01:37:00 2015 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Mon Oct 26 01:37:10 2015 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Mon Oct 26 01:37:20 2015 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Mon Oct 26 01:37:30 2015 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Mon Oct 26 01:37:40 2015 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Mon Oct 26 01:37:50 2015 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Mon Oct 26 01:37:58 2015 travelLaptop/192.168.2.112:57081 [travelLaptop] Inactivity timeout (--ping-restart), restarting

I would really appreciate any help with this!

Thanks in advance!

Florian.

User avatar
maikcat
Forum Team
Posts: 4200
Joined: Wed Jan 12, 2011 9:23 am
Location: Athens,Greece
Contact:

Re: Cannot connect via external address but only internal IP

Post by maikcat » Tue Oct 27, 2015 12:29 pm

are you testing while in the same network with your openvpn server?

Michael.

blackndwhite
OpenVpn Newbie
Posts: 3
Joined: Sun Oct 25, 2015 11:41 pm

Re: Cannot connect via external address but only internal IP

Post by blackndwhite » Tue Oct 27, 2015 1:42 pm

yes I tested both the internal IP and the external domai, while being in the same network.

Now I tested it while being in on mobile network and it works. Thank you so much!

blackndwhite
OpenVpn Newbie
Posts: 3
Joined: Sun Oct 25, 2015 11:41 pm

Re: Cannot connect via external address but only internal IP

Post by blackndwhite » Tue Oct 27, 2015 3:11 pm

That was indeed the problem!

Thank you so much! :)

Post Reply