Quantcast
Channel: EdgeRouter topics
Viewing all articles
Browse latest Browse all 20028

openVPN and port 1194 firewall problem

$
0
0

I have created an openvpn interface on my EdgeRouter ER-X, using port 1194.

 

I am having an issue with the firewall side of it however.

 

I created a rule on the interface eth0/local for port 1194 that will accept established and new UDP packets, but when I try to connect to my VPN from the outside, it is not letting traffic in.  I cannot connect to my server at all.

 

However, if I change the interface for the rule to be eth0/in, I can connect just fine, without any issues.

 

This seems backwards to me.  I am not connecting to a device running openvpn behind the router, I am connect to the router itself with an openvpn interface.  

 

Below is my config that does not work:

 

firewall {
    all-ping enable
    broadcast-ping disable
    ipv6-receive-redirects disable
    ipv6-src-route disable
    ip-src-route disable
    log-martians enable
    name lan_in {
        default-action drop
        description "from internet to lan"
        rule 1 {
            action accept
            description "allow established and related"
            log disable
            protocol all
            state {
                established enable
                invalid disable
                new disable
                related enable
            }
        }
    }
    name router_in {
        default-action drop
        description "from internet to router"
        rule 1 {
            action accept
            description "allow established and related"
            log disable
            protocol all
            state {
                established enable
                invalid disable
                new disable
                related enable
            }
        }
        rule 2 {
            action accept
            description "allow ICMP from anywhere"
            log disable
            protocol icmp
        }
        rule 3 {
            action accept
            description "allow openvpn"
            log disable
            protocol udp
            source {
                port 1194
            }
            state {
                established enable
                invalid disable
                new enable
                related disable
            }
        }
    }
    receive-redirects disable
    send-redirects enable
    source-validation disable
    syn-cookies enable
}
interfaces {
    ethernet eth0 {
        address dhcp
        description internet
        duplex auto
        firewall {
            in {
                name lan_in
            }
            local {
                name router_in
            }
        }
        speed auto
    }
    ethernet eth1 {
        duplex auto
        speed auto
    }
    ethernet eth2 {
        duplex auto
        speed auto
    }
    ethernet eth3 {
        duplex auto
        speed auto
    }
    ethernet eth4 {
        duplex auto
        speed auto
    }
    loopback lo {
    }
    openvpn vtun0 {
        config-file /config/xxx.conf
        description "xxx vpn"
    }
    switch switch0 {
        address 10.1.10.254/24
        description universal
        mtu 1500
        switch-port {
            interface eth1 {
            }
            interface eth2 {
            }
            interface eth3 {
            }
            interface eth4 {
            }
            vlan-aware disable
        }
    }
}
port-forward {
    auto-firewall enable
    hairpin-nat disable
    wan-interface eth0
}
service {
    dhcp-server {
        disabled false
        hostfile-update disable
        shared-network-name universal {
            authoritative disable
            subnet 10.1.10.0/24 {
                default-router 10.1.10.254
                dns-server 10.1.10.254
                lease 86400
                start 10.1.10.2 {
                    stop 10.1.10.253
                }
            }
        }
    }
    dns {
        forwarding {
            cache-size 150
            listen-on eth0
            listen-on switch0
        }
    }
    gui {
        http-port 80
        https-port 443
        older-ciphers enable
    }
    nat {
        rule 5000 {
            description "universal internet access"
            log disable
            outbound-interface eth0
            protocol all
            type masquerade
        }
    }
    ssh {
        port 22
        protocol-version v2
    }
}
system {
    host-name universalfw
    login {
        user xxx {
            authentication {
                encrypted-password xxx
                plaintext-password ""
            }
            level admin
        }
    }
    name-server 8.8.8.8
    name-server 8.8.4.4
    ntp {
        server 0.ubnt.pool.ntp.org {
        }
        server 1.ubnt.pool.ntp.org {
        }
        server 2.ubnt.pool.ntp.org {
        }
        server 3.ubnt.pool.ntp.org {
        }
    }
    syslog {
        global {
            facility all {
                level notice
            }
            facility protocols {
                level debug
            }
        }
    }
    time-zone America/Detroit
}


/* Warning: Do not remove the following line. */
/* === vyatta-config-version: "config-management@1:conntrack@1:cron@1:dhcp-relay@1:dhcp-server@4:firewall@5:ipsec@5:nat@3:qos@1:quagga@2:system@4:ubnt-pptp@1:ubnt-util@1:vrrp@1:webgui@1:webproxy@1:zone-policy@1" === */
/* Release version: v1.8.5.4884695.160608.1057 */

Any help is greatly appreciated.

 

Thanks!

 

 


Viewing all articles
Browse latest Browse all 20028

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>