openvpn rcell 100
Tagged: openvpn vpn rcell100
- This topic has 5 replies, 3 voices, and was last updated 4 years, 8 months ago by
ernesto.
-
AuthorPosts
-
July 1, 2020 at 6:06 am #30893
ernesto
ParticipantHi,
I’m working with rcell 100 for first time, I configured openvpn client, from the log I see
“mtrv1 openvpn[4023]: Initialization Sequence Completed”
but in statistic the status is down. I’m confused, after all is up or down?From the rcell I can ping the vpnserver, but from vpnserver I can’t ping or ssh to rcell.
What I’m missing?
The rcell it’s configured with eth0 as wan.Thanks
July 2, 2020 at 8:26 am #30897Jeff Hatch
KeymasterErnesto,
I recommend that you create a Multitech Support Portal case at https://support.multitech.com where they can help you figure this out.
Jeff
July 6, 2020 at 6:53 am #30908ernesto
ParticipantIt worked after I add this rule
iptables -A INPUT -i tuntunclient -p tcp -m tcp -j ACCEPT
I created script to add this every the router reboots.
How can add this rule through firewall in the webpage?
I supose is in the inbound rule, but I do not know the configurations.Can somebody give me the equivalent configuration of above rule?
July 14, 2020 at 9:46 am #30935dicksonemily290@gmail.com
ParticipantIs this VPN for free you are talking about? I’m interested in this one. Please give me some more details. Thank you!
July 20, 2020 at 12:24 pm #30975Jeff Hatch
KeymasterErnesto,
Are you using a custom configuration or are you using the configuration generated by configuring the VPN through the UI? If you are using the UI, and have mPower 5.2.1 on the device, there is a feature to specify the tunnel the rule is intended for in the Firewall Web UI.
Jeff
July 21, 2020 at 4:36 am #30979ernesto
ParticipantHello Jeff,
I’m using the custom configuration, the configuration is generated by open vpnserver. I simply copy all and paste in the custom configuration field.
It was needed the file with user and password for authentication, I copy to router with WinSCP.
When I configure rules in WebUI, the rules is going to User Input and User Forward chain and that didn’t work, I don’t know why.
After some time I configured via commandline the following rules and worked.
After that, I created script to restore these rules every time it reboots.iptables -A TUNNELING -p tcp -m tcp -i tun+ -j ACCEPT
iptables -A TUNNELING -p tcp -m tcp -o tun+ -j ACCEPT
iptables -A TUNNELING -p icmp -j ACCEPTiptables -A OUTPUT -o br0 -p tcp -m tcp -j ACCEPT
iptables -A INPUT -i br0 -p tcp -m tcp -j ACCEPTiptables -t nat -A POSTROUTING -o tun+ -j MASQUERADE
iptables -A TUNNEL_FORWARD -d 192.168.0.0/24 -i tun+ -p tcp -m tcp -j ACCEPT
iptables -t nat -A PREROUTING -i tun+ -p tcp -m tcp –dport 5000 -j DNAT –to-destination 192.168.0.2:5000
iptables -t nat -A PREROUTING -i tun+ -p tcp -m tcp –dport 6080 -j DNAT –to-destination 192.168.0.2:6080
iptables -t nat -A PREROUTING -i tun+ -p tcp -m tcp –dport 5520 -j DNAT –to-destination 192.168.0.2:5520 -
AuthorPosts
- You must be logged in to reply to this topic.