Mozilla VPN adds a new wrinkle.
Posted: Fri Apr 23, 2021 5:46 pm
Hello.
I have been using OpenVPN in a split-tunnel configuration for some time - connecting my home PC as a client to my work PC as the server. Recently, I've added Mozilla VPN to the home PC to route all traffic. (I understand that OpenVPN can achieve this as well, but I digress.)
From a technical perspective, I am still able to attach the home PC to the OpenVPN server - through the Mozilla VPN, and I can see the new public IP address from the server logs - and I assumed that since the connection was successfully completed, that it would function the same from the server side - but I cannot connect back to the home PC via RDP as I have before & I'm not quite sure where the break is. Will I need to add a route to the server config file?
---
port [port#]
proto udp
dev tap-server
dev-node tap-udp_[port#]
log-append tap-udp_[port#].log
ca "CA.crt"
cert "VPN.crt"
key "Server.key"
dh "dh.pem"
tls-auth "ta.key" 0
crl-verify "crl.pem"
topology subnet
server-bridge 192.168.77.101 255.255.255.0 192.168.77.150 192.168.77.150
push "route 192.168.77.0 255.255.255.0"
float
client-to-client
keepalive 1 20
cipher AES-256-GCM
max-clients 1
verb 2
mute 20
explicit-exit-notify 1
---
Thanks!
I have been using OpenVPN in a split-tunnel configuration for some time - connecting my home PC as a client to my work PC as the server. Recently, I've added Mozilla VPN to the home PC to route all traffic. (I understand that OpenVPN can achieve this as well, but I digress.)
From a technical perspective, I am still able to attach the home PC to the OpenVPN server - through the Mozilla VPN, and I can see the new public IP address from the server logs - and I assumed that since the connection was successfully completed, that it would function the same from the server side - but I cannot connect back to the home PC via RDP as I have before & I'm not quite sure where the break is. Will I need to add a route to the server config file?
---
port [port#]
proto udp
dev tap-server
dev-node tap-udp_[port#]
log-append tap-udp_[port#].log
ca "CA.crt"
cert "VPN.crt"
key "Server.key"
dh "dh.pem"
tls-auth "ta.key" 0
crl-verify "crl.pem"
topology subnet
server-bridge 192.168.77.101 255.255.255.0 192.168.77.150 192.168.77.150
push "route 192.168.77.0 255.255.255.0"
float
client-to-client
keepalive 1 20
cipher AES-256-GCM
max-clients 1
verb 2
mute 20
explicit-exit-notify 1
---
Thanks!