Dear All, First, let me apologize as it may not be a right topic to
ask here. I hope, some of you have come across and solved the same problem
already. I’ve been having problem with OpenVPN server on my FC4
box and client on my XP box. I could connect from the client to the server but
could not ping. My connection diagram looks like this: Client1 <---> Mikrotik (with NAT)
<---> FC4 (OpenVPN Server) <---> CISCO 7206 <--->
Client2
|
Client3 If I tried to connect from Client3 (without passing through
the Router or Mikrotik NAT), it is fine; they can ping each other. However,
when I try to connect from Client1 (through Mikrotik 2.9 with NAT) or Client2
(from outside through my border Router with IOS 12.0), they cannot ping each
other. For Client1, I’m quite sure, it is the problem of
Mikrotik firewall/NAT rules. For Client2, it may be the Router access-list
policy. I’m desperate in how to resolve this after searching through the
Web for a while, esp. the OpenVPN web site. I hope, some of you have had the
same experience and would help me out. Here is my server config (on FC4): --- port 1194 proto udp dev tun server 192.168.99.0 255.255.255.0 ifconfig 192.168.99.1 255.255.255.0 #ifconfig-pool-persist ipp.txt mode server ca /etc/openvpn/easy-rsa/keys/ca.crt cert /etc/openvpn/easy-rsa/keys/vpnserver.crt key /etc/openvpn/easy-rsa/keys/vpnserver.key #
This file should be kept secret dh /etc/openvpn/easy-rsa/keys/dh1024.pem #duplicate-cn #client-config-dir /etc/openvpn/ccd push "route 202.79.24.64 255.255.255.192" push "route 202.79.24.128 255.255.255.192" user nobody group nobody keepalive 10 120 comp-lzo persist-key persist-tun log-append /etc/openvpn/openvpn.log status /etc/openvpn/openvpn-status.log verb 3 --- Here is a client config (on Windows XP): --- client dev tun proto udp remote 202.79.24.151 1194 resolv-retry infinite nobind persist-key persist-tun ca ca.crt cert client1.crt key client1.key comp-lzo verb 3 --- Here is the log on server when a client connects: --- Fri Mar 3 10:28:49 2006 OpenVPN 2.0.5
i386-redhat-linux-gnu [SSL] [LZO] [EPOLL] built on Nov 4 2005 Fri Mar 3 10:28:49 2006 Diffie-Hellman initialized
with 1024 bit key Fri Mar 3 10:28:49 2006 TLS-Auth MTU parms [ L:1542
D:138 EF:38 EB:0 ET:0 EL:0 ] Fri Mar 3 10:28:49 2006 TUN/TAP device tun0 opened Fri Mar 3 10:28:49 2006 /sbin/ip link set dev tun0 up
mtu 1500 Fri Mar 3 10:28:49 2006 /sbin/ip addr add dev tun0
local 192.168.99.1 peer 192.168.99.2 Fri Mar 3 10:28:50 2006 /sbin/ip route add
192.168.99.0/24 via 192.168.99.2 Fri Mar 3 10:28:50 2006 Data Channel MTU parms [
L:1542 D:1400 EF:42 EB:135 ET:0 EL:0 AF:3/1 ] Fri Mar 3 10:28:50 2006 GID set to nobody Fri Mar 3 10:28:50 2006 UID set to nobody Fri Mar 3 10:28:50 2006 UDPv4 link local (bound):
[undef]:1194 Fri Mar 3 10:28:50 2006 UDPv4 link remote: [undef] Fri Mar 3 10:28:50 2006 MULTI: multi_init called,
r=256 v=256 Fri Mar 3 10:28:50 2006 IFCONFIG POOL: base=192.168.99.4
size=62 Fri Mar 3 10:28:50 2006 Initialization Sequence
Completed Fri Mar 3 10:29:08 2006 MULTI: multi_create_instance
called Fri Mar 3 10:29:08 2006 202.79.24.158:1566 Re-using
SSL/TLS context Fri Mar 3 10:29:08 2006 202.79.24.158:1566 LZO
compression initialized Fri Mar 3 10:29:08 2006 202.79.24.158:1566 Control
Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ] Fri Mar 3 10:29:08 2006 202.79.24.158:1566 Data
Channel MTU parms [ L:1542 D:1400 EF:42 EB:135 ET:0 EL:0 AF:3/1 ] Fri Mar 3 10:29:08 2006 202.79.24.158:1566 Local
Options hash (VER=V4): '530fdded' Fri Mar 3 10:29:08 2006 202.79.24.158:1566 Expected
Remote Options hash (VER=V4): '41690919' Fri Mar 3 10:29:08 2006 202.79.24.158:1566 TLS:
Initial packet from 202.79.24.158:1566, sid=e379c074 060c9d72 Fri Mar 3 10:29:08 2006 202.79.24.158:1566 VERIFY OK:
depth=1, /C=KH/ST=KD/L=PP/O=WICAM.NET/OU=Base/CN=vpnserver/emailAddress= Fri Mar 3 10:29:08 2006 202.79.24.158:1566 VERIFY OK:
depth=0, /C=KH/ST=KD/O=WICAM.NET/OU=Base/CN=vidol/emailAddress= Fri Mar 3 10:29:08 2006 202.79.24.158:1566 Data
Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key Fri Mar 3 10:29:08 2006 202.79.24.158:1566 Data
Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Fri Mar 3 10:29:08 2006 202.79.24.158:1566 Data
Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key Fri Mar 3 10:29:08 2006 202.79.24.158:1566 Data
Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Fri Mar 3 10:29:08 2006 202.79.24.158:1566 Control
Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA Fri Mar 3 10:29:08 2006 202.79.24.158:1566 [vidol]
Peer Connection Initiated with 202.79.24.158:1566 Fri Mar 3 10:29:08 2006 vidol/202.79.24.158:1566
MULTI: Learn: 192.168.99.6 -> vidol/202.79.24.158:1566 Fri Mar 3 10:29:08 2006 vidol/202.79.24.158:1566
MULTI: primary virtual IP for vidol/202.79.24.158:1566: 192.168.99.6 Fri Mar 3 10:29:09 2006 vidol/202.79.24.158:1566 PUSH:
Received control message: 'PUSH_REQUEST' Fri Mar 3 10:29:09 2006 vidol/202.79.24.158:1566 SENT
CONTROL [vidol]: 'PUSH_REPLY,route 202.79.24.64 255.255.255.192,route
202.79.24.128 255.255.255.192,route 192.168.99.1,ping 10,ping-restart
120,ifconfig 192.168.99.6 192.168.99.5' (status=1) --- Thank you, Khem |