VPN - Client cannot access hosts lan

Report wireless and/or network connectivity problems in this forum.

Moderator: Moderators

coolman
Posts: 23
Joined: Mon May 11, 2015 10:35 am

VPN - Client cannot access hosts lan

Post by coolman »

Gargoyle on esxi, tried with stable x86/64 ext4 combined and ispyisail 30 July x86/64 ext4 combined, same issue with basic VPN server with the option to allow client to access host in lan.
The client can estabilish correctly the connection but can only ping in lan the ip of gargoyle "192.168.10.164 and the VPN IP 10.0.8.2 work correctly.
Internal lan class is 192.168.10.0/24

Same config executed in webgui with a wndr3700v4 gargoyle 1.10 works like a charm without issue.


server.config ESXI

Code: Select all

mode                  server
port                  1194
proto                 udp
tls-server
ifconfig              10.8.0.1 255.255.255.0
topology              subnet
client-config-dir     /etc/openvpn/ccd
script-security       2
tls-verify	      "/usr/lib/gargoyle/ovpn-cn-check.sh /etc/openvpn/verified-userlist"
crl-verify            /etc/openvpn/crl.pem





cipher                AES-256-CBC

dev                   tun
keepalive             25 180
status                /var/run/openvpn_status
verb                  3


dh                    /etc/openvpn/dh1024.pem
ca                    /etc/openvpn/ca.crt
cert                  /etc/openvpn/server.crt
key                   /etc/openvpn/server.key
tls-auth              /etc/openvpn/ta.key 0

persist-key
persist-tun
comp-lzo

push "topology subnet"
push "route-gateway 10.8.0.1"
push "redirect-gateway def1"

client.config ESXI

Code: Select all

client
remote          WAN IP 1194
dev             tun
proto           udp
status          current_status
resolv-retry    infinite
remote-cert-tls server
topology        subnet
verb            3

cipher          AES-256-CBC

ca              ca.crt
cert            client1.crt
key             client1.key
tls-auth        ta.key 1

nobind
persist-key
persist-tun
comp-lzo
server config wndr3700v4

Code: Select all

mode                  server
port                  1194
proto                 udp
tls-server
ifconfig              10.8.0.1 255.255.255.0
topology              subnet
client-config-dir     /etc/openvpn/ccd





cipher                BF-CBC
keysize               128

dev                   tun
keepalive             25 180
status                /var/run/openvpn_status
verb                  3


dh                    /etc/openvpn/dh1024.pem
ca                    /etc/openvpn/ca.crt
cert                  /etc/openvpn/server.crt
key                   /etc/openvpn/server.key
tls-auth              /etc/openvpn/ta.key 0

persist-key
persist-tun
comp-lzo

push "topology subnet"
push "route-gateway 10.8.0.1"
push "redirect-gateway def1"
client.config WNDR3700V4

Code: Select all

client
remote          WAN IP 1194
dev             tun
proto           udp
status          current_status
resolv-retry    infinite
remote-cert-tls server
topology        subnet
verb            3

cipher          BF-CBC
keysize               128

ca              ca.crt
cert            vpn.crt
key             vpn.key
tls-auth        ta.key 1

nobind
persist-key
persist-tun
comp-lzo

ispyisail
Moderator
Posts: 5185
Joined: Mon Apr 06, 2009 3:15 am
Location: New Zealand

Re: VPN - Client cannot access hosts lan

Post by ispyisail »

screen shots please

coolman
Posts: 23
Joined: Mon May 11, 2015 10:35 am

Re: VPN - Client cannot access hosts lan

Post by coolman »

I hope that this screenshot can explain better than my words.
I need that all traffic pass trough in VPN and tah I can access to my hosts in lan with subnet 192.168.10.x/24.

Image
https://freeimage.host/i/DACLg
Image
https://freeimage.host/i/DAoBa
Image
https://freeimage.host/i/DAxEJ
Image
https://freeimage.host/i/DAzrv

Lantis
Moderator
Posts: 6753
Joined: Mon Jan 05, 2015 5:33 am
Location: Australia

Re: VPN - Client cannot access hosts lan

Post by Lantis »

Can you post logs from the client trying to connect please?
Are you using the Openvpn application for Windows?

My first suggestion would be to try "client prefers vpn_gateway".
http://lantisproject.com/downloads/gargoyle_ispyisail.php for the latest releases
Please be respectful when posting. I do this in my free time on a volunteer basis.

coolman
Posts: 23
Joined: Mon May 11, 2015 10:35 am

Re: VPN - Client cannot access hosts lan

Post by coolman »

Tried with the vpn_gateway option , seems that nothing change

client log NO vpn_gateway

Code: Select all

Mon Sep 16 15:13:51 2019 OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 26 2018
Mon Sep 16 15:13:51 2019 Windows version 6.2 (Windows 8 or greater) 64bit
Mon Sep 16 15:13:51 2019 library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10
Enter Management Password:
Mon Sep 16 15:13:51 2019 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25341
Mon Sep 16 15:13:51 2019 Need hold release from management interface, waiting...
Mon Sep 16 15:13:52 2019 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25341
Mon Sep 16 15:13:52 2019 MANAGEMENT: CMD 'state on'
Mon Sep 16 15:13:52 2019 MANAGEMENT: CMD 'log all on'
Mon Sep 16 15:13:52 2019 MANAGEMENT: CMD 'echo all on'
Mon Sep 16 15:13:52 2019 MANAGEMENT: CMD 'bytecount 5'
Mon Sep 16 15:13:52 2019 MANAGEMENT: CMD 'hold off'
Mon Sep 16 15:13:52 2019 MANAGEMENT: CMD 'hold release'
Mon Sep 16 15:13:52 2019 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Sep 16 15:13:52 2019 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Sep 16 15:13:52 2019 MANAGEMENT: >STATE:1568639632,RESOLVE,,,,,,
Mon Sep 16 15:13:52 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]87.*.*.*:1194
Mon Sep 16 15:13:52 2019 Socket Buffers: R=[65536->65536] S=[64512->64512]
Mon Sep 16 15:13:52 2019 UDP link local: (not bound)
Mon Sep 16 15:13:52 2019 UDP link remote: [AF_INET]87.*.*.*:1194
Mon Sep 16 15:13:52 2019 MANAGEMENT: >STATE:1568639632,WAIT,,,,,,
Mon Sep 16 15:13:52 2019 MANAGEMENT: >STATE:1568639632,AUTH,,,,,,
Mon Sep 16 15:13:52 2019 TLS: Initial packet from [AF_INET]87.*.*.*:1194, sid=f503cd72 7bf57e89
Mon Sep 16 15:13:52 2019 VERIFY OK: depth=1, C=??, ST=UnknownProvince, L=UnknownCity, O=UnknownOrg, OU=UnknownOrgUnit, CN=fvgekhthfgnwynx, name=fvgekhthfgnwynx, emailAddress=fvgekhthfgnwynx@dpjmhqobcpfrhvn.com
Mon Sep 16 15:13:52 2019 VERIFY KU OK
Mon Sep 16 15:13:52 2019 Validating certificate extended key usage
Mon Sep 16 15:13:52 2019 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Mon Sep 16 15:13:52 2019 VERIFY EKU OK
Mon Sep 16 15:13:52 2019 VERIFY OK: depth=0, C=??, ST=UnknownProvince, L=UnknownCity, O=UnknownOrg, OU=UnknownOrgUnit, CN=fvgekhthfgnwynx, name=fvgekhthfgnwynx, emailAddress=fvgekhthfgnwynx@dpjmhqobcpfrhvn.com
Mon Sep 16 15:13:52 2019 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
Mon Sep 16 15:13:52 2019 [fvgekhthfgnwynx] Peer Connection Initiated with [AF_INET]87.*.*.*:1194
Mon Sep 16 15:13:53 2019 MANAGEMENT: >STATE:1568639633,GET_CONFIG,,,,,,
Mon Sep 16 15:13:53 2019 SENT CONTROL [fvgekhthfgnwynx]: 'PUSH_REQUEST' (status=1)
Mon Sep 16 15:13:55 2019 PUSH: Received control message: 'PUSH_REPLY,topology subnet,route-gateway 10.8.0.1,redirect-gateway def1,ping 25,ping-restart 180,route 192.168.10.0 255.255.255.0 10.8.0.1,ifconfig 10.8.0.2 255.255.255.0,peer-id 0,cipher AES-256-GCM'
Mon Sep 16 15:13:55 2019 OPTIONS IMPORT: timers and/or timeouts modified
Mon Sep 16 15:13:55 2019 OPTIONS IMPORT: --ifconfig/up options modified
Mon Sep 16 15:13:55 2019 OPTIONS IMPORT: route options modified
Mon Sep 16 15:13:55 2019 OPTIONS IMPORT: route-related options modified
Mon Sep 16 15:13:55 2019 OPTIONS IMPORT: peer-id set
Mon Sep 16 15:13:55 2019 OPTIONS IMPORT: adjusting link_mtu to 1625
Mon Sep 16 15:13:55 2019 OPTIONS IMPORT: data channel crypto options modified
Mon Sep 16 15:13:55 2019 Data Channel: using negotiated cipher 'AES-256-GCM'
Mon Sep 16 15:13:55 2019 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mon Sep 16 15:13:55 2019 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mon Sep 16 15:13:55 2019 interactive service msg_channel=1016
Mon Sep 16 15:13:55 2019 ROUTE_GATEWAY 192.168.105.254/255.255.255.0 I=7 HWADDR=6c:f0:49:0f:14:a9
Mon Sep 16 15:13:55 2019 open_tun
Mon Sep 16 15:13:55 2019 TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{10139D65-514C-40BF-8368-500F381555D8}.tap
Mon Sep 16 15:13:55 2019 TAP-Windows Driver Version 9.21 
Mon Sep 16 15:13:55 2019 Set TAP-Windows TUN subnet mode network/local/netmask = 10.8.0.0/10.8.0.2/255.255.255.0 [SUCCEEDED]
Mon Sep 16 15:13:55 2019 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.8.0.2/255.255.255.0 on interface {10139D65-514C-40BF-8368-500F381555D8} [DHCP-serv: 10.8.0.254, lease-time: 31536000]
Mon Sep 16 15:13:55 2019 Successful ARP Flush on interface [3] {10139D65-514C-40BF-8368-500F381555D8}
Mon Sep 16 15:13:55 2019 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
Mon Sep 16 15:13:55 2019 MANAGEMENT: >STATE:1568639635,ASSIGN_IP,,10.8.0.2,,,,
Mon Sep 16 15:14:00 2019 TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up
Mon Sep 16 15:14:00 2019 C:\WINDOWS\system32\route.exe ADD 87.*.*.* MASK 255.255.255.255 192.168.105.254
Mon Sep 16 15:14:00 2019 Route addition via service succeeded
Mon Sep 16 15:14:00 2019 C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.8.0.1
Mon Sep 16 15:14:00 2019 Route addition via service succeeded
Mon Sep 16 15:14:00 2019 C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.8.0.1
Mon Sep 16 15:14:00 2019 Route addition via service succeeded
Mon Sep 16 15:14:00 2019 MANAGEMENT: >STATE:1568639640,ADD_ROUTES,,,,,,
Mon Sep 16 15:14:00 2019 C:\WINDOWS\system32\route.exe ADD 192.168.10.0 MASK 255.255.255.0 10.8.0.1
Mon Sep 16 15:14:00 2019 Route addition via service succeeded
Mon Sep 16 15:14:00 2019 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Mon Sep 16 15:14:00 2019 Initialization Sequence Completed
Mon Sep 16 15:14:00 2019 MANAGEMENT: >STATE:1568639640,CONNECTED,SUCCESS,10.8.0.2,87.*.*.*,1194,,
Mon Sep 16 15:18:32 2019 C:\WINDOWS\system32\route.exe DELETE 192.168.10.0 MASK 255.255.255.0 10.8.0.1
Mon Sep 16 15:18:32 2019 Route deletion via service succeeded
Mon Sep 16 15:18:32 2019 C:\WINDOWS\system32\route.exe DELETE 87.*.*.* MASK 255.255.255.255 192.168.105.254
Mon Sep 16 15:18:32 2019 Route deletion via service succeeded
Mon Sep 16 15:18:32 2019 C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.8.0.1
Mon Sep 16 15:18:32 2019 Route deletion via service succeeded
Mon Sep 16 15:18:32 2019 C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.8.0.1
Mon Sep 16 15:18:32 2019 Route deletion via service succeeded
Mon Sep 16 15:18:32 2019 Closing TUN/TAP interface
Mon Sep 16 15:18:32 2019 TAP: DHCP address released
Mon Sep 16 15:18:32 2019 SIGTERM[hard,] received, process exiting
Mon Sep 16 15:18:32 2019 MANAGEMENT: >STATE:1568639912,EXITING,SIGTERM,,,,,
client log WITH vpn_gateway

Code: Select all

Mon Sep 16 15:56:03 2019 UDP link local: (not bound)
Mon Sep 16 15:56:03 2019 UDP link remote: [AF_INET]87.x.x.x:1194
Mon Sep 16 15:56:03 2019 MANAGEMENT: >STATE:1568642163,WAIT,,,,,,
Mon Sep 16 15:56:03 2019 MANAGEMENT: >STATE:1568642163,AUTH,,,,,,
Mon Sep 16 15:56:03 2019 TLS: Initial packet from [AF_INET]87.x.x.x:1194, sid=ce673443 adc1715c
Mon Sep 16 15:56:03 2019 VERIFY OK: depth=1, C=??, ST=UnknownProvince, L=UnknownCity, O=UnknownOrg, OU=UnknownOrgUnit, CN=fvgekhthfgnwynx, name=fvgekhthfgnwynx, emailAddress=fvgekhthfgnwynx@dpjmhqobcpfrhvn.com
Mon Sep 16 15:56:03 2019 VERIFY KU OK
Mon Sep 16 15:56:03 2019 Validating certificate extended key usage
Mon Sep 16 15:56:03 2019 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Mon Sep 16 15:56:03 2019 VERIFY EKU OK
Mon Sep 16 15:56:03 2019 VERIFY OK: depth=0, C=??, ST=UnknownProvince, L=UnknownCity, O=UnknownOrg, OU=UnknownOrgUnit, CN=fvgekhthfgnwynx, name=fvgekhthfgnwynx, emailAddress=fvgekhthfgnwynx@dpjmhqobcpfrhvn.com
Mon Sep 16 15:56:03 2019 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
Mon Sep 16 15:56:03 2019 [fvgekhthfgnwynx] Peer Connection Initiated with [AF_INET]87.x.x.x:1194
Mon Sep 16 15:56:04 2019 MANAGEMENT: >STATE:1568642164,GET_CONFIG,,,,,,
Mon Sep 16 15:56:04 2019 SENT CONTROL [fvgekhthfgnwynx]: 'PUSH_REQUEST' (status=1)
Mon Sep 16 15:56:04 2019 PUSH: Received control message: 'PUSH_REPLY,topology subnet,route-gateway 10.8.0.1,redirect-gateway def1,ping 25,ping-restart 180,route 192.168.10.0 255.255.255.0 10.8.0.1,ifconfig 10.8.0.2 255.255.255.0,peer-id 0,cipher AES-256-GCM'
Mon Sep 16 15:56:04 2019 OPTIONS IMPORT: timers and/or timeouts modified
Mon Sep 16 15:56:04 2019 OPTIONS IMPORT: --ifconfig/up options modified
Mon Sep 16 15:56:04 2019 OPTIONS IMPORT: route options modified
Mon Sep 16 15:56:04 2019 OPTIONS IMPORT: route-related options modified
Mon Sep 16 15:56:04 2019 OPTIONS IMPORT: peer-id set
Mon Sep 16 15:56:04 2019 OPTIONS IMPORT: adjusting link_mtu to 1625
Mon Sep 16 15:56:04 2019 OPTIONS IMPORT: data channel crypto options modified
Mon Sep 16 15:56:04 2019 Data Channel: using negotiated cipher 'AES-256-GCM'
Mon Sep 16 15:56:04 2019 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mon Sep 16 15:56:04 2019 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mon Sep 16 15:56:04 2019 interactive service msg_channel=684
Mon Sep 16 15:56:04 2019 ROUTE_GATEWAY 192.168.105.254/255.255.255.0 I=7 HWADDR=6c:f0:49:0f:14:a9
Mon Sep 16 15:56:04 2019 open_tun
Mon Sep 16 15:56:04 2019 TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{10139D65-514C-40BF-8368-500F381555D8}.tap
Mon Sep 16 15:56:04 2019 TAP-Windows Driver Version 9.21 
Mon Sep 16 15:56:04 2019 Set TAP-Windows TUN subnet mode network/local/netmask = 10.8.0.0/10.8.0.2/255.255.255.0 [SUCCEEDED]
Mon Sep 16 15:56:04 2019 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.8.0.2/255.255.255.0 on interface {10139D65-514C-40BF-8368-500F381555D8} [DHCP-serv: 10.8.0.254, lease-time: 31536000]
Mon Sep 16 15:56:04 2019 Successful ARP Flush on interface [3] {10139D65-514C-40BF-8368-500F381555D8}
Mon Sep 16 15:56:04 2019 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
Mon Sep 16 15:56:04 2019 MANAGEMENT: >STATE:1568642164,ASSIGN_IP,,10.8.0.2,,,,
Mon Sep 16 15:56:09 2019 TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up
Mon Sep 16 15:56:09 2019 C:\WINDOWS\system32\route.exe ADD 87.x.x.x MASK 255.255.255.255 192.168.105.254
Mon Sep 16 15:56:09 2019 Route addition via service succeeded
Mon Sep 16 15:56:09 2019 C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.8.0.1
Mon Sep 16 15:56:09 2019 Route addition via service succeeded
Mon Sep 16 15:56:09 2019 C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.8.0.1
Mon Sep 16 15:56:09 2019 Route addition via service succeeded
Mon Sep 16 15:56:09 2019 MANAGEMENT: >STATE:1568642169,ADD_ROUTES,,,,,,
Mon Sep 16 15:56:09 2019 C:\WINDOWS\system32\route.exe ADD 192.168.10.0 MASK 255.255.255.0 10.8.0.1
Mon Sep 16 15:56:09 2019 Route addition via service succeeded
Mon Sep 16 15:56:09 2019 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Mon Sep 16 15:56:09 2019 Initialization Sequence Completed
Mon Sep 16 15:56:09 2019 MANAGEMENT: >STATE:1568642169,CONNECTED,SUCCESS,10.8.0.2,87.x.x.x,1194,,
client.config with vpn_gateway option

Code: Select all

client
remote          87.*.*.* 1194
dev             tun
proto           udp
status          current_status
resolv-retry    infinite
remote-cert-tls server
topology        subnet
verb            3

cipher          AES-256-CBC

ca              ca.crt
cert            client1.crt
key             client1.key
tls-auth        ta.key 1

nobind
persist-key
persist-tun
comp-lzo

Lantis
Moderator
Posts: 6753
Joined: Mon Jan 05, 2015 5:33 am
Location: Australia

Re: VPN - Client cannot access hosts lan

Post by Lantis »

It seems more like a client issue? It is the clients responsibility to create the correct routes based on what it is told via the config files.

It says that it is creating the routes, but are they actually established? Can you check.
http://lantisproject.com/downloads/gargoyle_ispyisail.php for the latest releases
Please be respectful when posting. I do this in my free time on a volunteer basis.

coolman
Posts: 23
Joined: Mon May 11, 2015 10:35 am

Re: VPN - Client cannot access hosts lan

Post by coolman »

The routes when VPN is estabilished:

Code: Select all


   Suffisso DNS specifico per connessione:
   Indirizzo IPv4. . . . . . . . . . . . : 10.8.0.2
   Subnet mask . . . . . . . . . . . . . : 255.255.255.0
   Gateway predefinito . . . . . . . . . :

Scheda Ethernet Ethernet:

   Suffisso DNS specifico per connessione:
   Indirizzo IPv4. . . . . . . . . . . . : 192.168.105.126
   Subnet mask . . . . . . . . . . . . . : 255.255.255.0
   Gateway predefinito . . . . . . . . . : 192.168.105.254

IPv4 Tabella route
===========================================================================
Route attive:
     Indirizzo rete             Mask          Gateway     Interfaccia Metrica
          0.0.0.0          0.0.0.0  192.168.105.254  192.168.105.126    281
          0.0.0.0        128.0.0.0         10.8.0.1         10.8.0.2    257
         10.8.0.0    255.255.255.0         On-link          10.8.0.2    257
         10.8.0.2  255.255.255.255         On-link          10.8.0.2    257
       10.8.0.255  255.255.255.255         On-link          10.8.0.2    257
     87.*.*.*  255.255.255.255  192.168.105.254  192.168.105.126    281
        127.0.0.0        255.0.0.0         On-link         127.0.0.1    331
        127.0.0.1  255.255.255.255         On-link         127.0.0.1    331
  127.255.255.255  255.255.255.255         On-link         127.0.0.1    331
        128.0.0.0        128.0.0.0         10.8.0.1         10.8.0.2    257
     192.168.10.0    255.255.255.0         10.8.0.1         10.8.0.2    257
    192.168.105.0    255.255.255.0         On-link   192.168.105.126    281
  192.168.105.126  255.255.255.255         On-link   192.168.105.126    281
  192.168.105.255  255.255.255.255         On-link   192.168.105.126    281
        224.0.0.0        240.0.0.0         On-link         127.0.0.1    331
        224.0.0.0        240.0.0.0         On-link          10.8.0.2    257
        224.0.0.0        240.0.0.0         On-link   192.168.105.126    281
  255.255.255.255  255.255.255.255         On-link         127.0.0.1    331
  255.255.255.255  255.255.255.255         On-link          10.8.0.2    257
  255.255.255.255  255.255.255.255         On-link   192.168.105.126    281
===========================================================================
Route permanenti:
   Indirizzo rete             Mask   Indir. gateway Metrica
          0.0.0.0          0.0.0.0  192.168.105.254  Predefinito
===========================================================================

ispyisail
Moderator
Posts: 5185
Joined: Mon Apr 06, 2009 3:15 am
Location: New Zealand

Re: VPN - Client cannot access hosts lan

Post by ispyisail »

Is this your own custom build?

Image

coolman
Posts: 23
Joined: Mon May 11, 2015 10:35 am

Re: VPN - Client cannot access hosts lan

Post by coolman »

It's a ESXI installation with the firmware : 1.11.0.x gargoyle-ispy 2019-July-30 20 - gargoyle_1.11.x-x86-64-combined-ext4.

This is fresh installed only with pppoe connection nothing else modified.
It's no my build, I'm not expertice for make a custom build!!! :( :lol:

coolman
Posts: 23
Joined: Mon May 11, 2015 10:35 am

Re: VPN - Client cannot access hosts lan

Post by coolman »

I think I've understood my problem.
My gargoyle "appliance" is not the main gateway of the LAN, the hosts in lan point to another primary gateway (Gargoyle on Netgear WNDR3700).
I've tried with other firewall/routers and the issue is the same for every openvpn connection maked.
I've tried a Sophos UTM connection with openvpn with the same issue, for solve the issue I have set a NAT Masquerade for Internal and external.
How can I replicate this setting with gargoyle?
https://ibb.co/9tg5b8K
Image

Post Reply