Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    No Internet through VPN, LAN works

    Scheduled Pinned Locked Moved OpenVPN
    19 Posts 5 Posters 3.1k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • A
      ace_ventura
      last edited by

      I cant seem to get internet to pass through the vpn connection.  I can do everything but use the internet.  I want all traffic to go through the vpn.  What am I missing?

      I don't have anything in the advanced config text box
      1.PNG
      1.PNG_thumb
      2.PNG
      2.PNG_thumb
      01.PNG
      01.PNG_thumb

      1 Reply Last reply Reply Quote 0
      • M
        marvosa
        last edited by

        Post your server1.conf.

        Define a Peer Certificate Revocation List.

        1 Reply Last reply Reply Quote 0
        • A
          ace_ventura
          last edited by

          Peer Certificate Revocation created.

          By server1.conf, I assume you mean the .ovpn file?

          1 Reply Last reply Reply Quote 0
          • M
            marvosa
            last edited by

            Diagnostics -> Edit File
            Navigate to "/var/etc/openvpn"
            Post the contents of "server1.conf"

            1 Reply Last reply Reply Quote 0
            • A
              ace_ventura
              last edited by

              here we go!  8)

              dev ovpns3
              dev-type tun
              tun-ipv6
              dev-node /dev/tun3
              writepid /var/run/openvpn_server3.pid
              #user nobody
              #group nobody
              script-security 3
              daemon
              keepalive 10 60
              ping-timer-rem
              persist-tun
              persist-key
              proto udp
              cipher AES-256-CBC
              up /usr/local/sbin/ovpn-linkup
              down /usr/local/sbin/ovpn-linkdown
              client-connect /usr/local/sbin/openvpn.attributes.sh
              client-disconnect /usr/local/sbin/openvpn.attributes.sh
              local 173.31.29.136
              tls-server
              server 10.0.8.0 255.255.255.0
              client-config-dir /var/etc/openvpn-csc
              username-as-common-name
              auth-user-pass-verify /var/etc/openvpn/server3.php via-env
              tls-verify /var/etc/openvpn/server3.tls-verify.php
              lport 1194
              management /var/etc/openvpn/server3.sock unix
              max-clients 10
              push "dhcp-option DOMAIN rykhoek.home"
              push "dhcp-option DNS 10.0.0.30"
              push "redirect-gateway def1"
              duplicate-cn
              ca /var/etc/openvpn/server3.ca
              cert /var/etc/openvpn/server3.cert
              key /var/etc/openvpn/server3.key
              dh /etc/dh-parameters.4096
              crl-verify /var/etc/openvpn/server3.crl-verify
              tls-auth /var/etc/openvpn/server3.tls-auth 0
              comp-lzo
              persist-remote-ip
              float

              1 Reply Last reply Reply Quote 0
              • M
                marvosa
                last edited by

                One thing I see is that you are missing is a route to your LAN, which I'm assuming is 10.0.0.0/24.  My guess is that since you specified a DNS of 10.0.0.30, your DNS queries are getting dropped.

                • Go to your config, uncheck "Force all client generated traffic thorough the tunnel"

                • Add your LAN subnet to "IPv4 Local Network/s"

                • Re-check "Force all client generated traffic thorough the tunnel"

                • Save

                Re-connect your client.  Verify 10.0.0.30 is answering DNS queries.  You should be good to go.

                1 Reply Last reply Reply Quote 0
                • A
                  ace_ventura
                  last edited by

                  Well that kind of works.  I do get internet but all my traffic isn't going through to my VPN.  I still have the public IP as if i wasn't connected to the VPN server.

                  1 Reply Last reply Reply Quote 0
                  • K
                    Keljian
                    last edited by

                    Two things:
                    1. Firewall rules need to be set to allow traffic out of the VPN to the wan and from the network is the VPN interface
                    2. Nat needs to be set up so that traffic is directed to the VPN

                    If you need help with these, please ask

                    1 Reply Last reply Reply Quote 0
                    • A
                      ace_ventura
                      last edited by

                      Well it used to work so i'm not sure what changed.  How do I need to set it up on the NAT page?

                      Attached has my firewall ovpn and wan rules

                      FWOVPNRules.PNG
                      FWOVPNRules.PNG_thumb
                      FWWANRules.PNG
                      FWWANRules.PNG_thumb

                      1 Reply Last reply Reply Quote 0
                      • A
                        ace_ventura
                        last edited by

                        May I get some assistance to make sure that I am getting my firewall and NAT rules correct to allow internet through the VPN?  I am still having this issue where only the internet does not work when I connect to the VPN.

                        1 Reply Last reply Reply Quote 0
                        • C
                          costasppc
                          last edited by

                          Me too, please.

                          Best regards

                          Kostas

                          1 Reply Last reply Reply Quote 0
                          • V
                            viragomann
                            last edited by

                            I've had also troubles with the check at "Force all client generated traffic thorough the tunnel" in 2.1.x combined with windows clients.
                            However push route work perfectly.
                            So you may try enter 0.0.0.0/0 in the "IPv4 Local Network/s" field to set the default route to VPN gateway.

                            1 Reply Last reply Reply Quote 0
                            • A
                              ace_ventura
                              last edited by

                              Tried entering push "route 0.0.0.0 255.255.255.0" in the servers advanced config and that didnt work.  I didn't see a IPv4 Local Networks field anywhere so I assumed you meant where I put it?

                              1 Reply Last reply Reply Quote 0
                              • V
                                viragomann
                                last edited by

                                @ace_ventura:

                                Tried entering push "route 0.0.0.0 255.255.255.0" in the servers advanced config and that didnt work.  I didn't see a IPv4 Local Networks field anywhere so I assumed you meant where I put it?

                                That will just push a route for the IP range 0.0.0.0 to 0.0.0.255!
                                Beyond that, I've read here that the push command in advanced setting is deprecated and shouldn't be used anymore.
                                The "IPv4 Local Network/s" field in sever config > tunnel settings is destined for pushing routes to clients now. There you have entered your LAN network currently. Replace it with 0.0.0.0/24.

                                1 Reply Last reply Reply Quote 0
                                • A
                                  ace_ventura
                                  last edited by

                                  When I do that it wont connect.

                                  Tue Feb 10 15:26:53 2015 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
                                  Tue Feb 10 15:26:53 2015 TLS Error: TLS handshake failed
                                  Tue Feb 10 15:26:53 2015 SIGUSR1[soft,tls-error] received, process restarting
                                  Tue Feb 10 15:26:55 2015 UDPv4 link local (bound): [undef]
                                  Tue Feb 10 15:26:55 2015 UDPv4 link remote: [AF_INET]MYIPADDRESS:1194

                                  If i just change it back to my network of 10.0.8.0 instead of 0.0.0.0 it connects no problem like it did before.

                                  1 Reply Last reply Reply Quote 0
                                  • V
                                    viragomann
                                    last edited by

                                    I've just tested this at my system. The connection is established anyway and the route is set on the client, however, with a higher metric than default route. So the default route is not overridden and this is no solution for you.

                                    Then I've the "Force all client generated traffic through the tunnel." option and that worked.

                                    What's about outbound NAT? If you have set it manual rule generation you have to add a rule for the VPN tunnel network also.

                                    1 Reply Last reply Reply Quote 0
                                    • A
                                      ace_ventura
                                      last edited by

                                      For outbound NAT i have the following:

                                      WAN 10.0.0.0/24 * * * WAN address * NO WAN bound

                                      I had "Force all client generated traffic through the tunnel" checked as well.

                                      1 Reply Last reply Reply Quote 0
                                      • V
                                        viragomann
                                        last edited by

                                        You have to add an additional rule for VPN outbound!

                                        WAN    10.0.8.0/24   *   *   *   WAN address   *   NO   Description
                                        
                                        1 Reply Last reply Reply Quote 0
                                        • A
                                          ace_ventura
                                          last edited by

                                          Yes!  That works!  Thank You! :)  Im not sure if that entry got deleted somehow or what happened because I know at some point or another it did work just fine!

                                          Sweet!

                                          1 Reply Last reply Reply Quote 0
                                          • First post
                                            Last post
                                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.