OpenVPN connects to the Server successfuly but no internet access
up vote
2
down vote
favorite
I want to setup an OpenVPN Server and after a week of trying day and night (no Linux Knowledge) I was able to successfully connect to the Server using OpenVPN GUI but now that I can Connect there is no ping 8.8.8.8 and the webpages won't open.
Server is Running: CentOS 7 X64
Client is Running: Windows 10 Pro Build 10586.17 X64 w/ Kaspersky Internet Security
This is my server Config
#change with your port
port 1337
#You can use udp or tcp
proto udp
# "dev tun" will create a routed IP tunnel.
dev tun
#Certificate Configuration
#ca certificate
ca ca.crt
#Server Certificate
cert server.crt
#Server Key and keep this is secret
key server.key
#See the size a dh key in /etc/openvpn/keys/
dh dh2048.pem
#Internal IP will get when already connect
server 192.168.200.0 255.255.255.0
#this line will redirect all traffic through our OpenVPN
push "redirect-gateway def1"
#Provide DNS servers to the client, you can use goolge DNS
push "dhcp-option DNS 8.8.8.8"
push "dhcp-option DNS 8.8.4.4"
#Enable multiple client to connect with same key
duplicate-cn
keepalive 20 60
comp-lzo
persist-key
persist-tun
daemon
#enable log
log-append /var/log/myvpn/openvpn.log
#Log Level
verb 3
This is my Client Config
client
dev tun
proto udp
remote MY_SERVER_IP_ADDRESS 1337
resolv-retry infinite
nobind
persist-key
persist-tun
mute-replay-warnings
comp-lzo
verb 3
<ca>
-----BEGIN CERTIFICATE-----
XXXXXXXXXXXXXXXXXXXXXXXXX
-----END CERTIFICATE-----
</ca>
<cert>
-----BEGIN CERTIFICATE-----
XXXXXXXXXXXXXXXXXXXXXXXXX
-----END CERTIFICATE-----
</cert>
<key>
-----BEGIN PRIVATE KEY-----
XXXXXXXXXXXXXXXXXXXXXXXXX
-----END PRIVATE KEY-----
</key>
EDIT: so I added the below commands too.
yum install iptables-services -y
systemctl mask firewalld
systemctl enable iptables
systemctl stop firewalld
systemctl start iptables
iptables --flush
iptables -t nat -A POSTROUTING -s 10.8.0.0/24 -o eth0 -j MASQUERADE
iptables-save > /etc/sysconfig/iptables
nano /etc/sysctl.conf
ADDEDD THIS TO sysctl.conf -> net.ipv4.ip_forward = 1
systemctl restart network.service
systemctl -f enable openvpn@server.service
systemctl start openvpn@server.service
But still I can connect but I have no ping and can't open any website.
Below is my route print
after establishing the connection to my Server.
Network Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 192.168.1.1 192.168.1.11 10
0.0.0.0 128.0.0.0 192.168.200.5 192.168.200.6 20
127.0.0.0 255.0.0.0 On-link 127.0.0.1 306
127.0.0.1 255.255.255.255 On-link 127.0.0.1 306
127.255.255.255 255.255.255.255 On-link 127.0.0.1 306
128.0.0.0 128.0.0.0 192.168.200.5 192.168.200.6 20
MY_SERVER_IP 255.255.255.255 192.168.1.1 192.168.1.11 10
169.254.0.0 255.255.0.0 On-link 169.254.61.91 276
169.254.61.91 255.255.255.255 On-link 169.254.61.91 276
169.254.255.255 255.255.255.255 On-link 169.254.61.91 276
192.168.1.0 255.255.255.0 On-link 192.168.1.11 266
192.168.1.11 255.255.255.255 On-link 192.168.1.11 266
192.168.1.255 255.255.255.255 On-link 192.168.1.11 266
192.168.183.0 255.255.255.0 On-link 192.168.183.1 276
192.168.183.1 255.255.255.255 On-link 192.168.183.1 276
192.168.183.255 255.255.255.255 On-link 192.168.183.1 276
192.168.200.1 255.255.255.255 192.168.200.5 192.168.200.6 20
192.168.200.4 255.255.255.252 On-link 192.168.200.6 276
192.168.200.6 255.255.255.255 On-link 192.168.200.6 276
192.168.200.7 255.255.255.255 On-link 192.168.200.6 276
192.168.230.0 255.255.255.0 On-link 192.168.230.1 276
192.168.230.1 255.255.255.255 On-link 192.168.230.1 276
192.168.230.255 255.255.255.255 On-link 192.168.230.1 276
224.0.0.0 240.0.0.0 On-link 127.0.0.1 306
224.0.0.0 240.0.0.0 On-link 192.168.1.11 266
224.0.0.0 240.0.0.0 On-link 169.254.61.91 276
224.0.0.0 240.0.0.0 On-link 192.168.200.6 276
224.0.0.0 240.0.0.0 On-link 192.168.230.1 276
224.0.0.0 240.0.0.0 On-link 192.168.183.1 276
255.255.255.255 255.255.255.255 On-link 127.0.0.1 306
255.255.255.255 255.255.255.255 On-link 192.168.1.11 266
255.255.255.255 255.255.255.255 On-link 169.254.61.91 276
255.255.255.255 255.255.255.255 On-link 192.168.200.6 276
255.255.255.255 255.255.255.255 On-link 192.168.230.1 276
255.255.255.255 255.255.255.255 On-link 192.168.183.1 276
centos openvpn internet
bumped to the homepage by Community♦ 2 days ago
This question has answers that may be good or bad; the system has marked it active so that they can be reviewed.
migrated from serverfault.com Dec 9 '15 at 21:28
This question came from our site for system and network administrators.
add a comment |
up vote
2
down vote
favorite
I want to setup an OpenVPN Server and after a week of trying day and night (no Linux Knowledge) I was able to successfully connect to the Server using OpenVPN GUI but now that I can Connect there is no ping 8.8.8.8 and the webpages won't open.
Server is Running: CentOS 7 X64
Client is Running: Windows 10 Pro Build 10586.17 X64 w/ Kaspersky Internet Security
This is my server Config
#change with your port
port 1337
#You can use udp or tcp
proto udp
# "dev tun" will create a routed IP tunnel.
dev tun
#Certificate Configuration
#ca certificate
ca ca.crt
#Server Certificate
cert server.crt
#Server Key and keep this is secret
key server.key
#See the size a dh key in /etc/openvpn/keys/
dh dh2048.pem
#Internal IP will get when already connect
server 192.168.200.0 255.255.255.0
#this line will redirect all traffic through our OpenVPN
push "redirect-gateway def1"
#Provide DNS servers to the client, you can use goolge DNS
push "dhcp-option DNS 8.8.8.8"
push "dhcp-option DNS 8.8.4.4"
#Enable multiple client to connect with same key
duplicate-cn
keepalive 20 60
comp-lzo
persist-key
persist-tun
daemon
#enable log
log-append /var/log/myvpn/openvpn.log
#Log Level
verb 3
This is my Client Config
client
dev tun
proto udp
remote MY_SERVER_IP_ADDRESS 1337
resolv-retry infinite
nobind
persist-key
persist-tun
mute-replay-warnings
comp-lzo
verb 3
<ca>
-----BEGIN CERTIFICATE-----
XXXXXXXXXXXXXXXXXXXXXXXXX
-----END CERTIFICATE-----
</ca>
<cert>
-----BEGIN CERTIFICATE-----
XXXXXXXXXXXXXXXXXXXXXXXXX
-----END CERTIFICATE-----
</cert>
<key>
-----BEGIN PRIVATE KEY-----
XXXXXXXXXXXXXXXXXXXXXXXXX
-----END PRIVATE KEY-----
</key>
EDIT: so I added the below commands too.
yum install iptables-services -y
systemctl mask firewalld
systemctl enable iptables
systemctl stop firewalld
systemctl start iptables
iptables --flush
iptables -t nat -A POSTROUTING -s 10.8.0.0/24 -o eth0 -j MASQUERADE
iptables-save > /etc/sysconfig/iptables
nano /etc/sysctl.conf
ADDEDD THIS TO sysctl.conf -> net.ipv4.ip_forward = 1
systemctl restart network.service
systemctl -f enable openvpn@server.service
systemctl start openvpn@server.service
But still I can connect but I have no ping and can't open any website.
Below is my route print
after establishing the connection to my Server.
Network Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 192.168.1.1 192.168.1.11 10
0.0.0.0 128.0.0.0 192.168.200.5 192.168.200.6 20
127.0.0.0 255.0.0.0 On-link 127.0.0.1 306
127.0.0.1 255.255.255.255 On-link 127.0.0.1 306
127.255.255.255 255.255.255.255 On-link 127.0.0.1 306
128.0.0.0 128.0.0.0 192.168.200.5 192.168.200.6 20
MY_SERVER_IP 255.255.255.255 192.168.1.1 192.168.1.11 10
169.254.0.0 255.255.0.0 On-link 169.254.61.91 276
169.254.61.91 255.255.255.255 On-link 169.254.61.91 276
169.254.255.255 255.255.255.255 On-link 169.254.61.91 276
192.168.1.0 255.255.255.0 On-link 192.168.1.11 266
192.168.1.11 255.255.255.255 On-link 192.168.1.11 266
192.168.1.255 255.255.255.255 On-link 192.168.1.11 266
192.168.183.0 255.255.255.0 On-link 192.168.183.1 276
192.168.183.1 255.255.255.255 On-link 192.168.183.1 276
192.168.183.255 255.255.255.255 On-link 192.168.183.1 276
192.168.200.1 255.255.255.255 192.168.200.5 192.168.200.6 20
192.168.200.4 255.255.255.252 On-link 192.168.200.6 276
192.168.200.6 255.255.255.255 On-link 192.168.200.6 276
192.168.200.7 255.255.255.255 On-link 192.168.200.6 276
192.168.230.0 255.255.255.0 On-link 192.168.230.1 276
192.168.230.1 255.255.255.255 On-link 192.168.230.1 276
192.168.230.255 255.255.255.255 On-link 192.168.230.1 276
224.0.0.0 240.0.0.0 On-link 127.0.0.1 306
224.0.0.0 240.0.0.0 On-link 192.168.1.11 266
224.0.0.0 240.0.0.0 On-link 169.254.61.91 276
224.0.0.0 240.0.0.0 On-link 192.168.200.6 276
224.0.0.0 240.0.0.0 On-link 192.168.230.1 276
224.0.0.0 240.0.0.0 On-link 192.168.183.1 276
255.255.255.255 255.255.255.255 On-link 127.0.0.1 306
255.255.255.255 255.255.255.255 On-link 192.168.1.11 266
255.255.255.255 255.255.255.255 On-link 169.254.61.91 276
255.255.255.255 255.255.255.255 On-link 192.168.200.6 276
255.255.255.255 255.255.255.255 On-link 192.168.230.1 276
255.255.255.255 255.255.255.255 On-link 192.168.183.1 276
centos openvpn internet
bumped to the homepage by Community♦ 2 days ago
This question has answers that may be good or bad; the system has marked it active so that they can be reviewed.
migrated from serverfault.com Dec 9 '15 at 21:28
This question came from our site for system and network administrators.
Is your server configured to NAT traffic from your OpenVPN subnet?
– EEAA
Dec 9 '15 at 21:10
Sorry man, but how can I be sure? I pretty new to Linux, only a week :(
– williclarkam
Dec 9 '15 at 21:25
If you didn't issue anyiptables
commands, then it's not yet set up correctly.
– EEAA
Dec 9 '15 at 21:25
Thanks man, I have improved the question, I have added thefollowings.yum install iptables-services -y systemctl mask firewalld systemctl enable iptables systemctl stop firewalld systemctl start iptables iptables --flush iptables -t nat -A POSTROUTING -s 10.8.0.0/24 -o eth0 -j MASQUERADE iptables-save > /etc/sysconfig/iptables nano /etc/sysctl.conf ADDEDD THIS TO sysctl.conf -> net.ipv4.ip_forward = 1 systemctl restart network.service systemctl -f enable openvpn@server.service systemctl start openvpn@server.service
– bossModus
Dec 9 '15 at 21:47
add a comment |
up vote
2
down vote
favorite
up vote
2
down vote
favorite
I want to setup an OpenVPN Server and after a week of trying day and night (no Linux Knowledge) I was able to successfully connect to the Server using OpenVPN GUI but now that I can Connect there is no ping 8.8.8.8 and the webpages won't open.
Server is Running: CentOS 7 X64
Client is Running: Windows 10 Pro Build 10586.17 X64 w/ Kaspersky Internet Security
This is my server Config
#change with your port
port 1337
#You can use udp or tcp
proto udp
# "dev tun" will create a routed IP tunnel.
dev tun
#Certificate Configuration
#ca certificate
ca ca.crt
#Server Certificate
cert server.crt
#Server Key and keep this is secret
key server.key
#See the size a dh key in /etc/openvpn/keys/
dh dh2048.pem
#Internal IP will get when already connect
server 192.168.200.0 255.255.255.0
#this line will redirect all traffic through our OpenVPN
push "redirect-gateway def1"
#Provide DNS servers to the client, you can use goolge DNS
push "dhcp-option DNS 8.8.8.8"
push "dhcp-option DNS 8.8.4.4"
#Enable multiple client to connect with same key
duplicate-cn
keepalive 20 60
comp-lzo
persist-key
persist-tun
daemon
#enable log
log-append /var/log/myvpn/openvpn.log
#Log Level
verb 3
This is my Client Config
client
dev tun
proto udp
remote MY_SERVER_IP_ADDRESS 1337
resolv-retry infinite
nobind
persist-key
persist-tun
mute-replay-warnings
comp-lzo
verb 3
<ca>
-----BEGIN CERTIFICATE-----
XXXXXXXXXXXXXXXXXXXXXXXXX
-----END CERTIFICATE-----
</ca>
<cert>
-----BEGIN CERTIFICATE-----
XXXXXXXXXXXXXXXXXXXXXXXXX
-----END CERTIFICATE-----
</cert>
<key>
-----BEGIN PRIVATE KEY-----
XXXXXXXXXXXXXXXXXXXXXXXXX
-----END PRIVATE KEY-----
</key>
EDIT: so I added the below commands too.
yum install iptables-services -y
systemctl mask firewalld
systemctl enable iptables
systemctl stop firewalld
systemctl start iptables
iptables --flush
iptables -t nat -A POSTROUTING -s 10.8.0.0/24 -o eth0 -j MASQUERADE
iptables-save > /etc/sysconfig/iptables
nano /etc/sysctl.conf
ADDEDD THIS TO sysctl.conf -> net.ipv4.ip_forward = 1
systemctl restart network.service
systemctl -f enable openvpn@server.service
systemctl start openvpn@server.service
But still I can connect but I have no ping and can't open any website.
Below is my route print
after establishing the connection to my Server.
Network Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 192.168.1.1 192.168.1.11 10
0.0.0.0 128.0.0.0 192.168.200.5 192.168.200.6 20
127.0.0.0 255.0.0.0 On-link 127.0.0.1 306
127.0.0.1 255.255.255.255 On-link 127.0.0.1 306
127.255.255.255 255.255.255.255 On-link 127.0.0.1 306
128.0.0.0 128.0.0.0 192.168.200.5 192.168.200.6 20
MY_SERVER_IP 255.255.255.255 192.168.1.1 192.168.1.11 10
169.254.0.0 255.255.0.0 On-link 169.254.61.91 276
169.254.61.91 255.255.255.255 On-link 169.254.61.91 276
169.254.255.255 255.255.255.255 On-link 169.254.61.91 276
192.168.1.0 255.255.255.0 On-link 192.168.1.11 266
192.168.1.11 255.255.255.255 On-link 192.168.1.11 266
192.168.1.255 255.255.255.255 On-link 192.168.1.11 266
192.168.183.0 255.255.255.0 On-link 192.168.183.1 276
192.168.183.1 255.255.255.255 On-link 192.168.183.1 276
192.168.183.255 255.255.255.255 On-link 192.168.183.1 276
192.168.200.1 255.255.255.255 192.168.200.5 192.168.200.6 20
192.168.200.4 255.255.255.252 On-link 192.168.200.6 276
192.168.200.6 255.255.255.255 On-link 192.168.200.6 276
192.168.200.7 255.255.255.255 On-link 192.168.200.6 276
192.168.230.0 255.255.255.0 On-link 192.168.230.1 276
192.168.230.1 255.255.255.255 On-link 192.168.230.1 276
192.168.230.255 255.255.255.255 On-link 192.168.230.1 276
224.0.0.0 240.0.0.0 On-link 127.0.0.1 306
224.0.0.0 240.0.0.0 On-link 192.168.1.11 266
224.0.0.0 240.0.0.0 On-link 169.254.61.91 276
224.0.0.0 240.0.0.0 On-link 192.168.200.6 276
224.0.0.0 240.0.0.0 On-link 192.168.230.1 276
224.0.0.0 240.0.0.0 On-link 192.168.183.1 276
255.255.255.255 255.255.255.255 On-link 127.0.0.1 306
255.255.255.255 255.255.255.255 On-link 192.168.1.11 266
255.255.255.255 255.255.255.255 On-link 169.254.61.91 276
255.255.255.255 255.255.255.255 On-link 192.168.200.6 276
255.255.255.255 255.255.255.255 On-link 192.168.230.1 276
255.255.255.255 255.255.255.255 On-link 192.168.183.1 276
centos openvpn internet
I want to setup an OpenVPN Server and after a week of trying day and night (no Linux Knowledge) I was able to successfully connect to the Server using OpenVPN GUI but now that I can Connect there is no ping 8.8.8.8 and the webpages won't open.
Server is Running: CentOS 7 X64
Client is Running: Windows 10 Pro Build 10586.17 X64 w/ Kaspersky Internet Security
This is my server Config
#change with your port
port 1337
#You can use udp or tcp
proto udp
# "dev tun" will create a routed IP tunnel.
dev tun
#Certificate Configuration
#ca certificate
ca ca.crt
#Server Certificate
cert server.crt
#Server Key and keep this is secret
key server.key
#See the size a dh key in /etc/openvpn/keys/
dh dh2048.pem
#Internal IP will get when already connect
server 192.168.200.0 255.255.255.0
#this line will redirect all traffic through our OpenVPN
push "redirect-gateway def1"
#Provide DNS servers to the client, you can use goolge DNS
push "dhcp-option DNS 8.8.8.8"
push "dhcp-option DNS 8.8.4.4"
#Enable multiple client to connect with same key
duplicate-cn
keepalive 20 60
comp-lzo
persist-key
persist-tun
daemon
#enable log
log-append /var/log/myvpn/openvpn.log
#Log Level
verb 3
This is my Client Config
client
dev tun
proto udp
remote MY_SERVER_IP_ADDRESS 1337
resolv-retry infinite
nobind
persist-key
persist-tun
mute-replay-warnings
comp-lzo
verb 3
<ca>
-----BEGIN CERTIFICATE-----
XXXXXXXXXXXXXXXXXXXXXXXXX
-----END CERTIFICATE-----
</ca>
<cert>
-----BEGIN CERTIFICATE-----
XXXXXXXXXXXXXXXXXXXXXXXXX
-----END CERTIFICATE-----
</cert>
<key>
-----BEGIN PRIVATE KEY-----
XXXXXXXXXXXXXXXXXXXXXXXXX
-----END PRIVATE KEY-----
</key>
EDIT: so I added the below commands too.
yum install iptables-services -y
systemctl mask firewalld
systemctl enable iptables
systemctl stop firewalld
systemctl start iptables
iptables --flush
iptables -t nat -A POSTROUTING -s 10.8.0.0/24 -o eth0 -j MASQUERADE
iptables-save > /etc/sysconfig/iptables
nano /etc/sysctl.conf
ADDEDD THIS TO sysctl.conf -> net.ipv4.ip_forward = 1
systemctl restart network.service
systemctl -f enable openvpn@server.service
systemctl start openvpn@server.service
But still I can connect but I have no ping and can't open any website.
Below is my route print
after establishing the connection to my Server.
Network Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 192.168.1.1 192.168.1.11 10
0.0.0.0 128.0.0.0 192.168.200.5 192.168.200.6 20
127.0.0.0 255.0.0.0 On-link 127.0.0.1 306
127.0.0.1 255.255.255.255 On-link 127.0.0.1 306
127.255.255.255 255.255.255.255 On-link 127.0.0.1 306
128.0.0.0 128.0.0.0 192.168.200.5 192.168.200.6 20
MY_SERVER_IP 255.255.255.255 192.168.1.1 192.168.1.11 10
169.254.0.0 255.255.0.0 On-link 169.254.61.91 276
169.254.61.91 255.255.255.255 On-link 169.254.61.91 276
169.254.255.255 255.255.255.255 On-link 169.254.61.91 276
192.168.1.0 255.255.255.0 On-link 192.168.1.11 266
192.168.1.11 255.255.255.255 On-link 192.168.1.11 266
192.168.1.255 255.255.255.255 On-link 192.168.1.11 266
192.168.183.0 255.255.255.0 On-link 192.168.183.1 276
192.168.183.1 255.255.255.255 On-link 192.168.183.1 276
192.168.183.255 255.255.255.255 On-link 192.168.183.1 276
192.168.200.1 255.255.255.255 192.168.200.5 192.168.200.6 20
192.168.200.4 255.255.255.252 On-link 192.168.200.6 276
192.168.200.6 255.255.255.255 On-link 192.168.200.6 276
192.168.200.7 255.255.255.255 On-link 192.168.200.6 276
192.168.230.0 255.255.255.0 On-link 192.168.230.1 276
192.168.230.1 255.255.255.255 On-link 192.168.230.1 276
192.168.230.255 255.255.255.255 On-link 192.168.230.1 276
224.0.0.0 240.0.0.0 On-link 127.0.0.1 306
224.0.0.0 240.0.0.0 On-link 192.168.1.11 266
224.0.0.0 240.0.0.0 On-link 169.254.61.91 276
224.0.0.0 240.0.0.0 On-link 192.168.200.6 276
224.0.0.0 240.0.0.0 On-link 192.168.230.1 276
224.0.0.0 240.0.0.0 On-link 192.168.183.1 276
255.255.255.255 255.255.255.255 On-link 127.0.0.1 306
255.255.255.255 255.255.255.255 On-link 192.168.1.11 266
255.255.255.255 255.255.255.255 On-link 169.254.61.91 276
255.255.255.255 255.255.255.255 On-link 192.168.200.6 276
255.255.255.255 255.255.255.255 On-link 192.168.230.1 276
255.255.255.255 255.255.255.255 On-link 192.168.183.1 276
centos openvpn internet
centos openvpn internet
edited Dec 9 '15 at 22:56
asked Dec 9 '15 at 21:10
bossModus
113
113
bumped to the homepage by Community♦ 2 days ago
This question has answers that may be good or bad; the system has marked it active so that they can be reviewed.
bumped to the homepage by Community♦ 2 days ago
This question has answers that may be good or bad; the system has marked it active so that they can be reviewed.
migrated from serverfault.com Dec 9 '15 at 21:28
This question came from our site for system and network administrators.
migrated from serverfault.com Dec 9 '15 at 21:28
This question came from our site for system and network administrators.
Is your server configured to NAT traffic from your OpenVPN subnet?
– EEAA
Dec 9 '15 at 21:10
Sorry man, but how can I be sure? I pretty new to Linux, only a week :(
– williclarkam
Dec 9 '15 at 21:25
If you didn't issue anyiptables
commands, then it's not yet set up correctly.
– EEAA
Dec 9 '15 at 21:25
Thanks man, I have improved the question, I have added thefollowings.yum install iptables-services -y systemctl mask firewalld systemctl enable iptables systemctl stop firewalld systemctl start iptables iptables --flush iptables -t nat -A POSTROUTING -s 10.8.0.0/24 -o eth0 -j MASQUERADE iptables-save > /etc/sysconfig/iptables nano /etc/sysctl.conf ADDEDD THIS TO sysctl.conf -> net.ipv4.ip_forward = 1 systemctl restart network.service systemctl -f enable openvpn@server.service systemctl start openvpn@server.service
– bossModus
Dec 9 '15 at 21:47
add a comment |
Is your server configured to NAT traffic from your OpenVPN subnet?
– EEAA
Dec 9 '15 at 21:10
Sorry man, but how can I be sure? I pretty new to Linux, only a week :(
– williclarkam
Dec 9 '15 at 21:25
If you didn't issue anyiptables
commands, then it's not yet set up correctly.
– EEAA
Dec 9 '15 at 21:25
Thanks man, I have improved the question, I have added thefollowings.yum install iptables-services -y systemctl mask firewalld systemctl enable iptables systemctl stop firewalld systemctl start iptables iptables --flush iptables -t nat -A POSTROUTING -s 10.8.0.0/24 -o eth0 -j MASQUERADE iptables-save > /etc/sysconfig/iptables nano /etc/sysctl.conf ADDEDD THIS TO sysctl.conf -> net.ipv4.ip_forward = 1 systemctl restart network.service systemctl -f enable openvpn@server.service systemctl start openvpn@server.service
– bossModus
Dec 9 '15 at 21:47
Is your server configured to NAT traffic from your OpenVPN subnet?
– EEAA
Dec 9 '15 at 21:10
Is your server configured to NAT traffic from your OpenVPN subnet?
– EEAA
Dec 9 '15 at 21:10
Sorry man, but how can I be sure? I pretty new to Linux, only a week :(
– williclarkam
Dec 9 '15 at 21:25
Sorry man, but how can I be sure? I pretty new to Linux, only a week :(
– williclarkam
Dec 9 '15 at 21:25
If you didn't issue any
iptables
commands, then it's not yet set up correctly.– EEAA
Dec 9 '15 at 21:25
If you didn't issue any
iptables
commands, then it's not yet set up correctly.– EEAA
Dec 9 '15 at 21:25
Thanks man, I have improved the question, I have added the
followings.yum install iptables-services -y systemctl mask firewalld systemctl enable iptables systemctl stop firewalld systemctl start iptables iptables --flush iptables -t nat -A POSTROUTING -s 10.8.0.0/24 -o eth0 -j MASQUERADE iptables-save > /etc/sysconfig/iptables nano /etc/sysctl.conf ADDEDD THIS TO sysctl.conf -> net.ipv4.ip_forward = 1 systemctl restart network.service systemctl -f enable openvpn@server.service systemctl start openvpn@server.service
– bossModus
Dec 9 '15 at 21:47
Thanks man, I have improved the question, I have added the
followings.yum install iptables-services -y systemctl mask firewalld systemctl enable iptables systemctl stop firewalld systemctl start iptables iptables --flush iptables -t nat -A POSTROUTING -s 10.8.0.0/24 -o eth0 -j MASQUERADE iptables-save > /etc/sysconfig/iptables nano /etc/sysctl.conf ADDEDD THIS TO sysctl.conf -> net.ipv4.ip_forward = 1 systemctl restart network.service systemctl -f enable openvpn@server.service systemctl start openvpn@server.service
– bossModus
Dec 9 '15 at 21:47
add a comment |
1 Answer
1
active
oldest
votes
up vote
0
down vote
You didn't mention what OS the client computer is using. It can be a fiewall issue or a problem with proper nat or ip forwarding.
First of all, after connecting check the ip configuration and routing at the client computer. Make sure that the routing table is correct and default route is set to the vpn server. You should also be able to ping it. If this much is ok then you have to check your vpn server's nat and firewall rules.
For Windows 7 or higher Windows OS, you also need to run the openvpn client as Administrator, otherwise the client is not able to set proper routing.
I have setup pritunl server and I have connected successfully using this method, with my Laptop and with my phone, so I don't think there has to be a firewall issue. I'm using Windows 10 with Kaspersky Internet Security 2016. How can i check in windows, that my routing table is correct? I run OpenVPN GUI always as administrator. Thanks for the reply, I greatly appreciated it.
– bossModus
Dec 9 '15 at 22:18
You can useroute print
to check the routing table.
– Diamant
Dec 9 '15 at 22:20
Thanks man for the replies. I have updated my question withroute print
. @bangal
– bossModus
Dec 9 '15 at 22:31
Well, as you can see there is no route for the network, 10.8.0.0/24, and there should also be a default route to your vpn server. You should also check with ipconfig if you are getting an ip at all. Windows 10 also has issue with openvpn. So see if you have the latest version installed.
– Diamant
Dec 9 '15 at 22:38
Interesting, But as you see I have addediptables -t nat -A POSTROUTING -s 10.8.0.0/24 -o eth0 -j MASQUERADE
to my firewall rules, right? maybe there is a problem with my interface card (eth0)? Is there any way to determine which interface is being used on my server to connect to internet) e.g. venet0 or ... ?
– bossModus
Dec 9 '15 at 22:49
|
show 1 more comment
1 Answer
1
active
oldest
votes
1 Answer
1
active
oldest
votes
active
oldest
votes
active
oldest
votes
up vote
0
down vote
You didn't mention what OS the client computer is using. It can be a fiewall issue or a problem with proper nat or ip forwarding.
First of all, after connecting check the ip configuration and routing at the client computer. Make sure that the routing table is correct and default route is set to the vpn server. You should also be able to ping it. If this much is ok then you have to check your vpn server's nat and firewall rules.
For Windows 7 or higher Windows OS, you also need to run the openvpn client as Administrator, otherwise the client is not able to set proper routing.
I have setup pritunl server and I have connected successfully using this method, with my Laptop and with my phone, so I don't think there has to be a firewall issue. I'm using Windows 10 with Kaspersky Internet Security 2016. How can i check in windows, that my routing table is correct? I run OpenVPN GUI always as administrator. Thanks for the reply, I greatly appreciated it.
– bossModus
Dec 9 '15 at 22:18
You can useroute print
to check the routing table.
– Diamant
Dec 9 '15 at 22:20
Thanks man for the replies. I have updated my question withroute print
. @bangal
– bossModus
Dec 9 '15 at 22:31
Well, as you can see there is no route for the network, 10.8.0.0/24, and there should also be a default route to your vpn server. You should also check with ipconfig if you are getting an ip at all. Windows 10 also has issue with openvpn. So see if you have the latest version installed.
– Diamant
Dec 9 '15 at 22:38
Interesting, But as you see I have addediptables -t nat -A POSTROUTING -s 10.8.0.0/24 -o eth0 -j MASQUERADE
to my firewall rules, right? maybe there is a problem with my interface card (eth0)? Is there any way to determine which interface is being used on my server to connect to internet) e.g. venet0 or ... ?
– bossModus
Dec 9 '15 at 22:49
|
show 1 more comment
up vote
0
down vote
You didn't mention what OS the client computer is using. It can be a fiewall issue or a problem with proper nat or ip forwarding.
First of all, after connecting check the ip configuration and routing at the client computer. Make sure that the routing table is correct and default route is set to the vpn server. You should also be able to ping it. If this much is ok then you have to check your vpn server's nat and firewall rules.
For Windows 7 or higher Windows OS, you also need to run the openvpn client as Administrator, otherwise the client is not able to set proper routing.
I have setup pritunl server and I have connected successfully using this method, with my Laptop and with my phone, so I don't think there has to be a firewall issue. I'm using Windows 10 with Kaspersky Internet Security 2016. How can i check in windows, that my routing table is correct? I run OpenVPN GUI always as administrator. Thanks for the reply, I greatly appreciated it.
– bossModus
Dec 9 '15 at 22:18
You can useroute print
to check the routing table.
– Diamant
Dec 9 '15 at 22:20
Thanks man for the replies. I have updated my question withroute print
. @bangal
– bossModus
Dec 9 '15 at 22:31
Well, as you can see there is no route for the network, 10.8.0.0/24, and there should also be a default route to your vpn server. You should also check with ipconfig if you are getting an ip at all. Windows 10 also has issue with openvpn. So see if you have the latest version installed.
– Diamant
Dec 9 '15 at 22:38
Interesting, But as you see I have addediptables -t nat -A POSTROUTING -s 10.8.0.0/24 -o eth0 -j MASQUERADE
to my firewall rules, right? maybe there is a problem with my interface card (eth0)? Is there any way to determine which interface is being used on my server to connect to internet) e.g. venet0 or ... ?
– bossModus
Dec 9 '15 at 22:49
|
show 1 more comment
up vote
0
down vote
up vote
0
down vote
You didn't mention what OS the client computer is using. It can be a fiewall issue or a problem with proper nat or ip forwarding.
First of all, after connecting check the ip configuration and routing at the client computer. Make sure that the routing table is correct and default route is set to the vpn server. You should also be able to ping it. If this much is ok then you have to check your vpn server's nat and firewall rules.
For Windows 7 or higher Windows OS, you also need to run the openvpn client as Administrator, otherwise the client is not able to set proper routing.
You didn't mention what OS the client computer is using. It can be a fiewall issue or a problem with proper nat or ip forwarding.
First of all, after connecting check the ip configuration and routing at the client computer. Make sure that the routing table is correct and default route is set to the vpn server. You should also be able to ping it. If this much is ok then you have to check your vpn server's nat and firewall rules.
For Windows 7 or higher Windows OS, you also need to run the openvpn client as Administrator, otherwise the client is not able to set proper routing.
answered Dec 9 '15 at 22:07
Diamant
1515
1515
I have setup pritunl server and I have connected successfully using this method, with my Laptop and with my phone, so I don't think there has to be a firewall issue. I'm using Windows 10 with Kaspersky Internet Security 2016. How can i check in windows, that my routing table is correct? I run OpenVPN GUI always as administrator. Thanks for the reply, I greatly appreciated it.
– bossModus
Dec 9 '15 at 22:18
You can useroute print
to check the routing table.
– Diamant
Dec 9 '15 at 22:20
Thanks man for the replies. I have updated my question withroute print
. @bangal
– bossModus
Dec 9 '15 at 22:31
Well, as you can see there is no route for the network, 10.8.0.0/24, and there should also be a default route to your vpn server. You should also check with ipconfig if you are getting an ip at all. Windows 10 also has issue with openvpn. So see if you have the latest version installed.
– Diamant
Dec 9 '15 at 22:38
Interesting, But as you see I have addediptables -t nat -A POSTROUTING -s 10.8.0.0/24 -o eth0 -j MASQUERADE
to my firewall rules, right? maybe there is a problem with my interface card (eth0)? Is there any way to determine which interface is being used on my server to connect to internet) e.g. venet0 or ... ?
– bossModus
Dec 9 '15 at 22:49
|
show 1 more comment
I have setup pritunl server and I have connected successfully using this method, with my Laptop and with my phone, so I don't think there has to be a firewall issue. I'm using Windows 10 with Kaspersky Internet Security 2016. How can i check in windows, that my routing table is correct? I run OpenVPN GUI always as administrator. Thanks for the reply, I greatly appreciated it.
– bossModus
Dec 9 '15 at 22:18
You can useroute print
to check the routing table.
– Diamant
Dec 9 '15 at 22:20
Thanks man for the replies. I have updated my question withroute print
. @bangal
– bossModus
Dec 9 '15 at 22:31
Well, as you can see there is no route for the network, 10.8.0.0/24, and there should also be a default route to your vpn server. You should also check with ipconfig if you are getting an ip at all. Windows 10 also has issue with openvpn. So see if you have the latest version installed.
– Diamant
Dec 9 '15 at 22:38
Interesting, But as you see I have addediptables -t nat -A POSTROUTING -s 10.8.0.0/24 -o eth0 -j MASQUERADE
to my firewall rules, right? maybe there is a problem with my interface card (eth0)? Is there any way to determine which interface is being used on my server to connect to internet) e.g. venet0 or ... ?
– bossModus
Dec 9 '15 at 22:49
I have setup pritunl server and I have connected successfully using this method, with my Laptop and with my phone, so I don't think there has to be a firewall issue. I'm using Windows 10 with Kaspersky Internet Security 2016. How can i check in windows, that my routing table is correct? I run OpenVPN GUI always as administrator. Thanks for the reply, I greatly appreciated it.
– bossModus
Dec 9 '15 at 22:18
I have setup pritunl server and I have connected successfully using this method, with my Laptop and with my phone, so I don't think there has to be a firewall issue. I'm using Windows 10 with Kaspersky Internet Security 2016. How can i check in windows, that my routing table is correct? I run OpenVPN GUI always as administrator. Thanks for the reply, I greatly appreciated it.
– bossModus
Dec 9 '15 at 22:18
You can use
route print
to check the routing table.– Diamant
Dec 9 '15 at 22:20
You can use
route print
to check the routing table.– Diamant
Dec 9 '15 at 22:20
Thanks man for the replies. I have updated my question with
route print
. @bangal– bossModus
Dec 9 '15 at 22:31
Thanks man for the replies. I have updated my question with
route print
. @bangal– bossModus
Dec 9 '15 at 22:31
Well, as you can see there is no route for the network, 10.8.0.0/24, and there should also be a default route to your vpn server. You should also check with ipconfig if you are getting an ip at all. Windows 10 also has issue with openvpn. So see if you have the latest version installed.
– Diamant
Dec 9 '15 at 22:38
Well, as you can see there is no route for the network, 10.8.0.0/24, and there should also be a default route to your vpn server. You should also check with ipconfig if you are getting an ip at all. Windows 10 also has issue with openvpn. So see if you have the latest version installed.
– Diamant
Dec 9 '15 at 22:38
Interesting, But as you see I have added
iptables -t nat -A POSTROUTING -s 10.8.0.0/24 -o eth0 -j MASQUERADE
to my firewall rules, right? maybe there is a problem with my interface card (eth0)? Is there any way to determine which interface is being used on my server to connect to internet) e.g. venet0 or ... ?– bossModus
Dec 9 '15 at 22:49
Interesting, But as you see I have added
iptables -t nat -A POSTROUTING -s 10.8.0.0/24 -o eth0 -j MASQUERADE
to my firewall rules, right? maybe there is a problem with my interface card (eth0)? Is there any way to determine which interface is being used on my server to connect to internet) e.g. venet0 or ... ?– bossModus
Dec 9 '15 at 22:49
|
show 1 more comment
Thanks for contributing an answer to Unix & Linux Stack Exchange!
- Please be sure to answer the question. Provide details and share your research!
But avoid …
- Asking for help, clarification, or responding to other answers.
- Making statements based on opinion; back them up with references or personal experience.
To learn more, see our tips on writing great answers.
Some of your past answers have not been well-received, and you're in danger of being blocked from answering.
Please pay close attention to the following guidance:
- Please be sure to answer the question. Provide details and share your research!
But avoid …
- Asking for help, clarification, or responding to other answers.
- Making statements based on opinion; back them up with references or personal experience.
To learn more, see our tips on writing great answers.
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2funix.stackexchange.com%2fquestions%2f248421%2fopenvpn-connects-to-the-server-successfuly-but-no-internet-access%23new-answer', 'question_page');
}
);
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Is your server configured to NAT traffic from your OpenVPN subnet?
– EEAA
Dec 9 '15 at 21:10
Sorry man, but how can I be sure? I pretty new to Linux, only a week :(
– williclarkam
Dec 9 '15 at 21:25
If you didn't issue any
iptables
commands, then it's not yet set up correctly.– EEAA
Dec 9 '15 at 21:25
Thanks man, I have improved the question, I have added the
followings.yum install iptables-services -y systemctl mask firewalld systemctl enable iptables systemctl stop firewalld systemctl start iptables iptables --flush iptables -t nat -A POSTROUTING -s 10.8.0.0/24 -o eth0 -j MASQUERADE iptables-save > /etc/sysconfig/iptables nano /etc/sysctl.conf ADDEDD THIS TO sysctl.conf -> net.ipv4.ip_forward = 1 systemctl restart network.service systemctl -f enable openvpn@server.service systemctl start openvpn@server.service
– bossModus
Dec 9 '15 at 21:47