Wednesday, August 20, 2014

I have commented out with # two lines iptables -I INPUT 1 -p udp --dport 1194 -j ACCEPT iptables -I


There are various circumstances, access to the home within the LAN from outside the home was needed. I tried to set where it is available (Linksys WRT150N) wireless LAN router where you installed the firmware that made the VPN build of DD-WRT. Web site you reference is a thing of the next. Important information thank you. To the remote access router -OpenVPN to try playing VPN (the easy way) in v24 + (English) http://www.dd-wrt.com/wiki/index.php/VPN_%28the_easy_way%29_v24%2B DD-WRT how to create a certificate (Japanese) http://linuxandxx.blog.fc2.com/blog-entry-47.html server protean was able to create without problems by the method of reference web site mentioned above. There are two access methods types of OpenVPN. Bridge system and (Routing) routing scheme is (Bridging), but there was a description set is the easy routing scheme. But I was not able to be installed easily in relation to the location of the home LAN of the OpenVPN server. They will work fine if the installation protean method The wireless LAN router that was installed OpenVPN server is like making a connection to the external Internet. [Wireless LAN router] (OpenVPN server) [home server class] towards the bridge system was the first successful in that (web server, mail server) surprising protean [Internet] arrangement to work with routing scheme. There was no problem in Reference web site as per above this. It was only configured to use the tap instead of tun as a device in the client configuration of the machine from which you want to access from outside protean As a side note. Well The placement of the home LAN at home. Wireless LAN router you have installed the DD-WRT uses as a wireless LAN access point as (disable) disable the WAN terminal. Placement of my home [Internet] domain name: example.com [NTT West Hikari HGW] (PR-400NE) (192.168.24.1) protean over over over over over over over over over over over over over over over [wireless protean LAN router] (OpenVPN) [home server] (192.168.24.8) (192.168.24.100) - home server management DNS, DHCP, WEB, MAIL, the Asterisk - routing scheme of the arrangement of our house This is the setting of the OpenVPN DD-WRT on. Here was also done in reference to the reference web site mentioned above, but I have some change.
I have revised the definition of the items in the push settings [OpenVPN Config] - [OpenVPN Daemon]. The home server directed to (192.168.24.100) the setting of the DNS server was so as to be registered to the client machine domain name (example.com) further. It had been registered automatically to the resolv.conf on the client machine in this push setting.
push "route 192.168.24.0 255.255.255.0" push "dhcp-option DNS 192.168.24.100" push "dhcp-option DOMAIN example.com" server 192.168.66.0 255.255.255.0 dev tun0 proto udp keepalive 10 120 dh / tmp / openvpn / dh.pem ca /tmp/openvpn/ca.crt cert /tmp/openvpn/cert.pem key /tmp/openvpn/key.pem # Only use crl-verify if you are using the revoke list - otherwise leave it commented out # setting screen of 5001 OpenVPN crl-verify /tmp/openvpn/ca.crl protean # management parameter allows DD-WRT's protean OpenVPN Status web page to access the server's management port # port must be 5001 for scripts embedded in firmware to work management localhost
I have commented out with # two lines iptables -I INPUT 1 -p udp --dport 1194 -j ACCEPT iptables -I FORWARD 1 -s 192.168.66.0/24 -j ACCEPT Firewall set a bottom. After this, OpenVPN packets from the external Internet: Perform protean the [IPv4 packet filter settings] and [static IP masquerade Settings to be directed to (192.168.24.8) wireless LAN router (UDP 1194) has become a OpenVPN server You. [Advanced Settings] - [static IP masquerade protean Settings] [Advanced Settings] protean - [static IP masquerade Settings] - [Entry Edit] [Advanced Settings] - [IPv4 packet filter Settings] - [Entry Edit] [Advanced Settings] - [IPv4 packet filter settings did not allow you to access from client protean machines outside in this state, protean I was able OpenVPN connection but access to the server in the home LAN. ping does not pass. It has become that it is connected properly in the status screen of OpenVPN. I tried doing actively reviewing the routing configuration of the DD-WRT wireless protean LAN router protean at first, but was not able to access. Look for the case "has installed protean OpenVPN server in your LAN" on the net, I tried to search the information that would be helpful or what. Then, that there is a problem with the routing configuration protean of the router HGW home LAN of (PR-400NE) Surprisingly was found. I did not must be set in the routing HGW (PR-400NE) a packet of 192.168.66.0/24 is a virtual LAN of OpenVPN. Was a surprising blind spot (sweat). As to route to (192.168.24.8) wireless LAN router is the gateway of OpenVPN OpenVPN protean packet of the (192.168.66.0/24) [static routing configuration - the configuration screen of HGW (PR-400NE) [Advanced] I was set to. For more information, please refer to the image of the setting screen. [Advanced Settings] - [static routing configuration] [Advanced Settings] - [Static Routing Settings] - [Entry Edit] it can be plugged back in from the client machine again in this state, to access the home server properly now.
I tried to get the syslog of authentication protean IWATSU BR-1000v of e-mail transmission 2014 (152) 8 May (14)nifty. IP check site availability dyn is dangerous firmware updates Iwatsu Electric BR-1000v of the print server function IWATSU BR-1000v repair IWATSU BR-1000v the cover of the printer to update PLANEX Mini100plus print server Asterisk 1.8.29.0_1 ? It 's but through OpenVPN home server of FreeBSD that use the (Ekiga Phone) softphone update DD-WRT 7 月 setting Icedove of php5, mysql55 update Debian Wheezy installation (routing scheme) FreeBSD (36) the OpenVPN server OpenVPN 12 月 (8) 2013 (279) 1 月 (10) 2 月 (16) March (24) 4 月 (13) 5 月 (31) 6 月 (19) 11 月July (38) 8 月 (30) 9 月 (27) 10 月 (18) (39)

No comments:

Post a Comment