Thanks for that option, and the specific command relative to my network, although I am less comfortable with making changes in iptables than addressing this directly through proper routing, and I would like to avoid the disadvantage you mentioned. But out of curiosity, I have also seen reference to using MASQ in iptables for accessing boxes behind the VPN server, is the SNAT command you provide just a different variation of that?
Ok, back to my primary issue which is still not resolved. I am confident this is a routing issue, and not a specific problem with OpenVPN, but I hope someone here can educate me and improve my knowledge of routing. From my original VPN setup (described in the original post) I have made one change, and that is to add a route on my default gateway (PfSense box) to redirect the VPN network traffic back out the VPN box, which should send it back through the tunnel to the point of origin. But clearly I must be mistaken about my routing somewhere. I will summarize my topology again and the current routing tables. Remote client network 192.168.123.0/24 VPN network 10.9.8.x VPN Server 10.9.8.1 Server LAN network 192.168.112.0/24 VPN Server LAN IP 192.168.112.50 DNS/DHCP Server 192.168.112.51 Gateway/Firewall/Router 192.168.112.11 Note that my network router and the VPN are not on the same box. The current routing table for the gateway/router box (PfSense) shows: [2.1.2-RELEASE][ad...@pfgateway.mei.lan]/root(1): netstat -rn Routing tables Internet: Destination Gateway Flags Refs Use Netif Expire default xxx.yy.190.17 UGS 1 663197177 bge0 10.9.8.0/24 192.168.112.50 UGS 0 0 rl0 xxx.yy.190.16/28 link#1 U 0 49927480 bge0 xxx.yy.190.18 link#1 UHS 0 0 lo0 xxx.yy.190.19 link#1 UHS 0 0 lo0 => xxx.yy.190.19/32 link#1 U 0 0 bge0 xxx.yy.190.20 link#1 UHS 0 0 lo0 => xxx.yy.190.20/32 link#1 U 0 0 bge0 xxx.yy.190.21 link#1 UHS 0 0 lo0 => xxx.yy.190.21/32 link#1 U 0 0 bge0 xxx.yy.190.22 link#1 UHS 0 0 lo0 => xxx.yy.190.22/32 link#1 U 0 0 bge0 127.0.0.1 link#6 UH 0 560 lo0 192.168.112.0/24 link#2 U 0 848109484 rl0 192.168.112.11 link#2 UHS 0 99857580 lo0 The network and routing information for the VPN box shows: [root@sequoia ~]# ifconfig eth0 Link encap:Ethernet HWaddr aa:bb:00:9D:B2:49 inet addr:192.168.112.50 Bcast:192.168.112.255 Mask:255.255.255.0 inet6 addr: fe80::5054:ff:fe9d:b249/64 Scope:Link UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:188054402 errors:0 dropped:0 overruns:0 frame:0 TX packets:169321935 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:36069946217 (33.5 GiB) TX bytes:47188246310 (43.9 GiB) < snip lo > tun0 Link encap:UNSPEC HWaddr 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00 inet addr:10.9.8.1 P-t-P:10.9.8.2 Mask:255.255.255.255 UP POINTOPOINT RUNNING NOARP MULTICAST MTU:1500 Metric:1 RX packets:9066254 errors:0 dropped:0 overruns:0 frame:0 TX packets:7591995 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:100 RX bytes:1029571120 (981.8 MiB) TX bytes:1210868888 (1.1 GiB) [root@192.168.112.50 ~]# route Kernel IP routing table Destination Gateway Genmask Flags Metric Ref Use Iface 10.9.8.2 * 255.255.255.255 UH 0 0 0 tun0 192.168.112.0 * 255.255.255.0 U 0 0 0 eth0 10.9.8.0 10.9.8.2 255.255.255.0 UG 0 0 0 tun0 link-local * 255.255.0.0 U 1002 0 0 eth0 default pfgateway.mei.l 0.0.0.0 UG 0 0 0 eth0 My goal is to be able to access a box (or two) behind the VPN server. Currently (still after making the one routing change) when trying to ping from a Windows client connected to the VPN server to a box behind the VPN server I get the following: C:\>ping 192.168.112.53 Pinging 192.168.112.53 with 32 bytes of data: Reply from 10.9.8.1: Destination host unreachable. Again, direct cc's are welcome as I only get the daily digest of this mailing list. Thanks. Jeff On 11/21/2015 2:55 AM, Morten Christensen wrote: > Den 19-11-2015 kl. 22:09 skrev jbo...@meridianenv.com: >> Greetings - >> >> I have a working OpenVPN server that I can access remotely, but now I >> want >> to access another box behind the OpenVPN server from the remote >> client. I >> have read the how-to's and FAQ on the OpenVPN website, and I believe >> that >> I need to make one change which is described by this statement: add a >> route in the default gateway for the VPN network IP subnet pointing >> to the >> OpenVPN machine. > > In addition to the fine advice's you have got until now there is a > simple solution, to use Snat. > > It could be a line like this in /etc/rc.local on the openvpn-server > (my example is ubuntu-based): > iptables -t nat -A POSTROUTING -s 10.8.9.0/24 -j SNAT --to 192.168.112.50 > > Disadvantage is, that the vpn-clients will be kind of anonymous on > your network. > >> My topology >> >> Remote client network 192.168.123.0/24 >> VPN network 10.8.9.x >> >> VPN Server 10.9.8.1 >> Server LAN network 192.168.112.0/24 >> VPN Server LAN IP 192.168.112.50 >> > > -- > Morten Christensen > > -- Jeff Boyce Meridian Environmental www.meridianenv.com ------------------------------------------------------------------------------ Go from Idea to Many App Stores Faster with Intel(R) XDK Give your users amazing mobile app experiences with Intel(R) XDK. Use one codebase in this all-in-one HTML5 development environment. Design, debug & build mobile apps & 2D/3D high-impact games for multiple OSs. http://pubads.g.doubleclick.net/gampad/clk?id=254741551&iu=/4140 _______________________________________________ Openvpn-users mailing list Openvpn-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/openvpn-users