Thanks for your answer,Best regards.
Posts by peluka82
-
-
I had to reconfigure my omv and now I can not get openvpn to work.
I post my server.conf
port 1194
proto udp
dev tun
ca "/etc/openvpn/pki/ca.crt"
cert "/etc/openvpn/pki/issued/raspberrypi.crt"
key "/etc/openvpn/pki/private/raspberrypi.key" # This file should be kept secret
dh "/etc/openvpn/pki/dh.pem"
topology subnet
server 10.8.0.0 255.255.255.0
push "route 10.8.0.0 255.255.255.0"
ifconfig-pool-persist ipp.txt
;push "route 255.255.255.0"
push "redirect-gateway def1 bypass-dhcp"
;client-to-client
keepalive 10 120
comp-lzo
plugin /usr/lib/openvpn/openvpn-plugin-auth-pam.so login
user nobody
group nogroupport: 1194
use compression: yes
PAM: yesVPN
Address: 10.8.0.0
MASK: 255.255.255.0
Gateway interface: enxb827eb691307
Default gateway: yesDHCP options
emptyPublic:
****.ddns.net
Thanks, -
Tested the plugin and for me it works, from the error message you are getting I do not think it is openvpn server issue it looks more like you can't reach your machine at all from your client.
Is your server behind a router ? If yes than in your router you need to open port 1194 for server local IP in the network.
For me it looks like this in my router:
Hello,I could make it work. The problem was in the configuration of the raspberry network card.In Lan / interfaces I added VLAN and everything worked correctly.Thank you very much for answering.
-
Hello,My configuration is the following:
port 1194
proto udp
dev tun
ca "/etc/openvpn/pki/ca.crt"
cert "/etc/openvpn/pki/issued/raspberrypi.crt"
key "/etc/openvpn/pki/private/raspberrypi.key" # This file should be kept secret
dh "/etc/openvpn/pki/dh.pem"
topology subnet
server 10.8.0.0 255.255.255.0
push "route 10.8.0.0 255.255.255.0"
ifconfig-pool-persist ipp.txt
;push "route 169.254.0.0
192.168.1.0 255.255.255.0"
push "redirect-gateway def1 bypass-dhcp"
;client-to-client
keepalive 10 120
comp-lzo
plugin /usr/lib/openvpn/openvpn-plugin-auth-pam.so login
user nobodyMy config:
- port: 1194
- use compression: yes
- PAM: yesVPN
- Address: 10.8.0.0
- MASK: 255.255.255.0
- Gateway interface: enxb827eb691307
- Default gateway: yesDHCP options
emptyPublic:
****.ddns.netthanks for answering so fast.
-
After poking a while to make this work and yes THIS thread helped a lot to figure out my problem. Could not find a tutorial for this at all but here it is my attempt of creating one:
- First install the plugin (openmediavault-openvpn 4.0.1)
SETTINGS:
General settings:
- Configure the plugin:
- enable: true
- port: 1194
- use compression: true
- PAM: trueVPN network:
- Address: 10.8.0.0
- MASK: 255.255.255.0
- Gateway interface: your internet interface (mine is ens5, but the interface is in the dropdown list just select the one connected to the internet)
- Default gateway: trueDHCP options
everything is emptyPublic:
- Public address: your IP or if NO-IP use your domain.ddns.net
FIXING THE SERVER:
- ssh into your server
- cd /etc/openvpn/
- nano server.conf
- find in this file something like ;push "route 192.168.0.0 255.255.255.0" (the IP address can be different 192.xx.xx.xx)
- in the above two things need to be changed first remove the ; if you have one in your config file, and than change the IP to the same VPN address 10.8.0.0
- From this: ;push "route 192.168.0.0 255.255.255.0" to this: push "route 10.8.0.0 255.255.255.0"
- restart the openvpn service: service openvpn status check if already started service openvpn stop, service openvpn status be sure it stopped, service openvpn start, service openvpn status be sure it startedCERTIFICATES:
- first create a user from left menu ACCESS RIGHTS MANAGEMENT -> User
- navigate back to your openVPN -> certificates click on ADD and select the user and give it a common name and finally save.
- select the user and click on DOWNLOAD CERTIFICATE
- Extract the archive
- in your VPN GUI import *.ovpn fileIF BEHIND ROUTER:
- if you have a router between your server and internet do not forget to open port 1194 UDPAfter poking a while to make this work and yes THIS thread helped a lot to figure out my problem. Could not find a tutorial for this at all but here it is my attempt of creating one:
- First install the plugin (openmediavault-openvpn 4.0.1)
SETTINGS:
General settings:
- Configure the plugin:
- enable: true
- port: 1194
- use compression: true
- PAM: trueVPN network:
- Address: 10.8.0.0
- MASK: 255.255.255.0
- Gateway interface: your internet interface (mine is ens5, but the interface is in the dropdown list just select the one connected to the internet)
- Default gateway: trueDHCP options
everything is emptyPublic:
- Public address: your IP or if NO-IP use your domain.ddns.net
FIXING THE SERVER:
- ssh into your server
- cd /etc/openvpn/
- nano server.conf
- find in this file something like ;push "route 192.168.0.0 255.255.255.0" (the IP address can be different 192.xx.xx.xx)
- in the above two things need to be changed first remove the ; if you have one in your config file, and than change the IP to the same VPN address 10.8.0.0
- From this: ;push "route 192.168.0.0 255.255.255.0" to this: push "route 10.8.0.0 255.255.255.0"
- restart the openvpn service: service openvpn status check if already started service openvpn stop, service openvpn status be sure it stopped, service openvpn start, service openvpn status be sure it startedCERTIFICATES:
- first create a user from left menu ACCESS RIGHTS MANAGEMENT -> User
- navigate back to your openVPN -> certificates click on ADD and select the user and give it a common name and finally save.
- select the user and click on DOWNLOAD CERTIFICATE
- Extract the archive
- in your VPN GUI import *.ovpn fileIF BEHIND ROUTER:
- if you have a router between your server and internet do not forget to open port 1194 UDPHi,I am trying to apply the solution in omv 4.1.3. and the server keeps responding "waiting for server".It's still working?Thank you.