Once again I am aiming at the standard out-of-the-box solution so I have setup the OpenVPN using the manual/Wiki (and forum) by this:
- first the "simple" (Windows) client: Everything works - the hosts can be reached from the client - GREAT!
- then site-to-site (both v11):
- connection establishes within seconds - and some minor traffic is flowing over time but...
- network clients cannot ping nor reach hosts through the VPN tunnel :-(
I have found these instructions on the Wiki that seems to address this problem:
But I cannot find this VPN Address Pool or the Advanced OpenVPN setting in Untangle v11 (or simply my ignorance).I'm using site-to-site and my software clients can only talk to the main server. Why?
If you have both software clients on the road and site-to-site tunnels, the software clients will only be able to see your main site by default. To allow them to transit the tunnel(s) to other sites, simply add the VPN Address Pool to the Exported Hosts and Networks. After this is done, software clients will be able to reach all exported sites.
How can I allow software clients to resolve DNS over the tunnel?
To allow DNS resolution for software clients you'll need to modify some OpenVPN settings - if Untangle is doing DNS resolution on your network, simply check Export DNS at OpenVPN Settings > Advanced > Address Pools for any VPN Address Pools you want DNS resolution exported for. If Untangle is not resolving DNS on your network, you'll need to check Export DNS, set DNS Override to Enabled, then enter the IP address of the DNS Server under Primary IP. You may need to use the FQDN when accessing resources across the tunnel.
I may have overlooked something - or I have to add some trivial (for the experienced user) setup somewhere else?
The routing hint from the Wiki sounds promising but I cannot see where - and what to add?
I am uncertain about the NAT setting on the OpenVPN setup but it does not remedy anything in the respect - as far as I an see...
TIA
--- Configs/routes ---
Untangle server with OpenVPN
= IPv4 Rules =
0: from all lookup local
100: from all fwmark 0xfe00/0xff00 lookup 1000
32766: from all lookup main
32767: from all lookup default
50000: from 192.168.1.79 lookup uplink.1
70001: from all fwmark 0x100/0xff00 lookup uplink.1
1000000: from all lookup uplink.1
= IPv4 Table main =
10.100.1.0/24 via 10.100.1.2 dev tun0
10.100.1.2 dev tun0 proto kernel scope link src 10.100.1.1
10.100.7.0/24 via 10.100.1.2 dev tun0
10.100.100.0/24 dev eth1 proto kernel scope link src 10.100.100.1
192.168.1.0/24 dev eth0 proto kernel scope link src 192.168.1.79
192.168.1.1 dev eth0 scope link
= IPv4 Table balance =
= IPv4 Table uplink.1 =
default via 192.168.1.1 dev eth0
= IPv4 Route Rules =
= IPv6 Rules =
0: from all lookup local
32766: from all lookup main
= IPv6 Table main =
fe80::/64 dev eth1 proto kernel metric 256
fe80::/64 dev utun proto kernel metric 256
= IPv6 Table uplink.1 =
Untangle server with connecting client
= IPv4 Rules =
0: from all lookup local
100: from all fwmark 0xfe00/0xff00 lookup 1000
32766: from all lookup main
32767: from all lookup default
50000: from 192.168.1.128 lookup uplink.1
70001: from all fwmark 0x100/0xff00 lookup uplink.1
70003: from all fwmark 0x300/0xff00 lookup uplink.3
900000: from all lookup balance
1000000: from all lookup uplink.1
= IPv4 Table main =
10.100.1.0/24 via 10.100.1.5 dev tun1
10.100.1.5 dev tun1 proto kernel scope link src 10.100.1.6
10.100.7.0/24 dev eth1 proto kernel scope link src 10.100.7.1
10.100.20.0/24 via 10.100.20.2 dev tun0
10.100.20.2 dev tun0 proto kernel scope link src 10.100.20.1
10.100.100.0/24 via 10.100.1.5 dev tun1
192.168.1.0/24 dev eth3 proto kernel scope link src 192.168.1.128
192.168.1.1 dev eth3 scope link
= IPv4 Table balance =
default via 192.168.1.1 dev eth3
= IPv4 Table uplink.1 =
default via 192.168.1.1 dev eth3
= IPv4 Table uplink.3 =
= IPv4 Route Rules =