content:en_us:7_ug_openvpn

OpenVPN

The OpenVPN server is a secure and cost effective way to provide road warrior VPN access to resources on the network. Unlike the PPTP VPN server, OpenVPN is more robust in getting through other firewalls and gateways.

An OpenVPN client is available at no cost for almost any OS (Windows, MacOS, iOS, GNU/Linux, Android) and form-factor (PC, Smartphone).

Installation

If your system does not have this app available, you can install it via the Marketplace.

Menu

Once installed, you can find this feature in the menu system at the following location:

<navigation>Network|VPN|OpenVPN</navigation>

Configuring the Server

It is a fundamental requirement for most VPN's that the client and server LAN's are on different subnets. As the subnets 192.168.0.0/24 and 192.168.1.0/24 are very common defaults in domestic routers, we strongly recommend that you do not use them on your ClearOS LAN. If you end up with the same subnet at both ends of the tunnel, the connection will be made but no traffic will pass.
Note for Active Directory Connector users.
The selected AD user must be a member of both the openvpn_plugin and user_certificates_plugin groups. See the Active Directory Connector documentation for details.

Security Certificates Information

Before you can configure OpenVPN, you may be directed to the Certificate Manager configuration page in the web-based administration tool. The information is required to create the necessary security certificates used in OpenVPN.

OpenVPN App menu

Firewall Warning

If the app does not detect the firewall being open for the “OpenVPN” service (UDP port 1194) and the “OpenVPN - TCP” service (TCP port 1194) it will show this warning screen. For normal operation with the client configurations you can download from the Webconfig (see further down the document), you will only need the “OpenVPN” service to be opened and not the “OpenVPN - TCP”.

Allow Connections Will open the firewall to the “OpenVPN” service (UDP port 1194) and the “OpenVPN - TCP” service (TCP port 1194).
Manual Configuration Will take you to the Incoming Firewall app where you can selectively open and close the firewall.
Hide This Warning will hide the firewall warning panel

If you are very security conscious, manually configure the firewall to open the OpenVPN service only then hide the warning

Settings

Automatic Configuration

The OpenVPN app has an automatic configuration feature that selects default settings based on your server's configuration. It will also update them if you make modifications to your server (eg. change LAN subnet).

Unless you are an advanced user, this feature should be left enabled. To disable the feature, click on Disable Auto Configuration in the information dialog.

If you have disabled Auto Configuration and want to re-enable it, edit the file /etc/clearos/openvpn.conf and change the “auto_configure” setting from “no” to “yes”. Then restart the app.

Internet Hostname

The Internet Hostname field is auto-populated using the server's Internet Hostname, set in the IP Settings app. This field entry should be a publicly available hostname that VPN users will use in their configuration as the VPN hostname to connect to. It is a key field and used in the client configuration file which you will download later on.

If you do not have your own domain, you can use the ClearOS XXX.poweredbyclear.com domain where xxx is your Subdomain in the Dynamic DNS app

Internet Domain

The Internet Domain field is auto-populated using the server's Default Domain, set in the IP Settings app. This field has no function in OpenVPN and is for information only.

DNS Server

A DNS server to use while connected through the VPN. This setting can be useful if accessing locally addressed/internal hostnames (eg. hp-laserjet.lan). Like Internet domain, this field is populated from the DNS server settings on the IP Settings app.

WINS Server

Windows Internet Name Service (WINS) is a NetBIOS name resolution service that allows client computers to register their NetBIOS names and IP addresses in a dynamic, distributed database and to resolve the NetBIOS names of network resources to their IP addresses. If you have a Microsoft[TM] server (or another server running Samba) on the LAN providing WINS, you would want to override the auto-configuration settings and set this to the IP of the server providing this service.

If you are running Samba locally, the automatic configuration settings is fine. If you are not running Samba or a MS WINS server anywhere on the network, this setting is irrelevant and can safely be ignored.

Depending on your network configuration, you may need to specify the WINS settings in VPN client configuration.

Additional Settings

Enable NAT

The Windows firewall often blocks connections (e.g.pings, file shares etc) from outside its own LAN. OpenVPN connections by default appear from 10.8.0.0/24 and will often be blocked but not always (e.g TightVNC creates a global exception in the firewall, not just one for the local LAN). You can adjust the Windows firewall on every machine, or you can enable this rule. With this rule enabled, all OpenVPN connections will appear to come from the ClearOS LAN IP. The advantage of this is that it is easy to set up. The disadvantage is that a LAN machine cannot identify where the connection is coming from.

This setting only affects ClearOS when it is in Gateway mode. When in Standalone mode, connections are NAT'd anyway.
If you previously created a Custom Firewall rule:
$IPTABLES -t nat -I POSTROUTING -s your_openvpn_subnet -j MASQUERADE

it can now be removed in favour of this option.

Force All traffic through VPN

By default OpenVPN allows split tunnelling, so, on the client, only traffic for the ClearOS LAN goes through the tunnel. The rest goes directly to the internet. If this is enabled, all traffic except DHCP (to get a lease from the local DHCP server/router) gets forced through the tunnel. This will slow down browsing on the client but allow you to control internet access with tools like Gateway Management.

Allow Client to Client traffic

By default, one OpenVPN client cannot talk to another. Enabling this allows them to connect to each other. This can help, for example, if you are remote to ClearOS and trying to give another remote user help by VNC or RDP. On the flip side, it is a bit less secure.

Force DNS through VPN

If you use the same domain name internally and externally, Windows can have problems resolving internal FQDN entries. This is because it fires off DNS lookups simultaneously to all its DNS servers and takes the first response. This will normally be the external DNS servers. Also, if your external DNS server resolves a wildcard to your external IP, all LAN resources will appear as your WAN IP which is not much use. It all depends on the type of reply your external DNS server gives for an unknown resource. Enabling this forces all DNS lookups to ClearOS. This will slow down external lookups if the setting is enabled as they all have to go via the VPN.

There is no point in enabling this if you enable “Force All traffic through VPN” but it won't harm.

App Policies

The Edit Members allows you to add users to the openVPN User list.

it is better to give users access through the User Manager app because they also need to be enabled as a Security Certificates User

Configuration Tricks

Automatic Login in Windows

Sometimes it may be desirable to have a PC automatically on boot up without user intervention. This is almost like using an automatic PPTP connection when you let Windows remember the password. Something similar can be done with OpenVPN. In order to do this, in the .ovpn file comment out the line “auth-user-pass”. In ClearOS in /etc/openvpn/clients.conf comment out the line “plugin /usr/lib64/openvpn/plugin/lib/openvpn-auth-pam.so openvpn”, then restart OpenVPN. In Windows go to the Services Manager (e.g. Windows+R > services.msc) and change the Startup Type for the OpenVPNService to Automatic. OpenVPN will now automatically connect to any profile it finds in the config folder, but only succeed where user/pass authentication has been disabled.

With automatic login, the connection is authenticated only by the certificates and at the moment there is no certificate revocation method available.

Windows 10 DNS resolution always resolves to an external IP

Windows 10 introduced a horrible feature in its DNS resolution. It queries all DNS resolvers simultaneously and takes the first answer it gets. Invariably this will be from the external DNS servers rather than through the LAN. If you need the names to resolve to a LAN IP you have three choices:

1 - Enable “Force All traffic through VPN” (drastic)
2 - Enable “Force DNS through VPN” (not so drastic)
3 - Edit the Windows hosts file so all LAN IP's resolve through it.

Adding additional subnets to go through the tunnel

OpenVPN will normally only give you access to your standard LAN's. If there are other subnets you want access to as well (HotLAN, DMZ, VLAN's, remote LAN's etc), add the additional subnets to the EXTRALANS parameter in /etc/clearos/network.conf in CIDR form, space separated, then restart OpenVPN. e.g.:

EXTRALANS="192.168.25.0/23 172.20.0/24"

More than 62 Users

By default, OpenVPN is configured to use the 10.8.0.0/24 subnet. Each user uses 4 IP's and the server uses 4. I am also not sure if the .252-.255 block is available. This means that the maximum number of users is 62 or 63. If you want to increase this, you need to expand the subnet. It is specified by the “server” line in /etc/openvpn/clients.conf (and /etc/openvpn/clients-tcp.conf). The first parameter must be the subnet base address and the second is the subnet mask. If the first parameter is not the base address, OpenVPN will fail to start. Care must be taken with expanding it so you don't overlap with the subnet in /etc/openvpn/clients-tcp.conf. Examples are:

server 10.8.0.0 255.255.254.0    # allows 126 or 127 addresses
server 10.8.0.0 255.255.252.0    # allows 254 or 255 addresses
server 10.8.0.0 255.255.248.0    # allows 510 or 511 addresses
server 10.8.0.0 255.255.240.0    # Be careful. You now overlap with /etc/openvpn/clients-tcp.conf so you need to move the subnet there as well

/etc/openvpn/clients-tcp.conf is largely irrelevant as we do not normally use tcp connections. You could move the subnet out of the way to 10.8.255.0/24 if it gets in the way. Also, using this file as another example:

server 10.8.10.0 255.255.254.0    # this will work
server 10.8.10.0 255.255.252.0    # this will fail as the base address for this subnet is 10.8.8.0
There is a handy subnet calculator here.

Managing User Accounts

Users must be configured with both OpenVPN and Security Certificate access. To manage users:

  • Go to the Users page in the web-based administration tool
  • Edit a selected user
  • Make sure both OpenVPN User and Security Certificates User are enabled

If you are using the Active Directory Connector, the selected AD user must be a member of both the openvpn_plugin and user_certificates_plugin groups. See the Active Directory Connector documentation for details.

Revoking Certificates

Currently this is a manual process. Start by initialising the file /etc/pki/CA/crlnumber:

echo 1000 > /etc/pki/CA/crlnumber

Create a file in /etc/cron.monthly. I used /etc/cron.monthly/openssl_crl. In it put:

openssl ca -gencrl -crldays 45 -config /usr/clearos/apps/certificate_manager/deploy/openssl.cnf -out /etc/pki/CA/crl/crl.pem > /dev/null 2>&1

And make the file executable:

chmod 0744 /etc/cron.monthly/openssl_crl

Then execute the file:

/etc/cron.monthly/openssl_crl

You should now find you have a file /etc/pki/CA/crl/crl.pem.

To revoke a certificate, find the file name in /etc/pki/CA. It should be in the form client-{username}-cert.pem and revoke it and regenerate the crl.pem with:

openssl ca -config /usr/clearos/apps/certificate_manager/deploy/openssl.cnf -revoke /etc/pki/CA/client-{username}-cert.pem
/etc/cron.monthly/openssl_crl

Obviously change {username} as appropriate.

You can check the CRL with:

openssl crl -in /etc/pki/CA/crl/crl.pem -noout -text

The revoked serial numbers can be cross-referenced against the serial number in /etc/pki/CA/index.txt.

In /etc/openvpn/clients/conf and clients-tcp.conf add the following line:

crl-verify /etc/pki/CA/crl/crl.pem

Then restart OpenVPN through the webconfig. You only have to do this once. OpenVPN always rereads the CRL when a new connection is initiated, so the most recent updates are always picked up.

Configuring the Client

Configuration file and Certificates

This step is common for all operating systems.

Using the web-based administration tool, logout (if applicable) as 'root' once the basic settings and user configuration as outlined above have been achieved.

Login as the road warrior user account that is to have access to the network via OpenVPN.

User Login

Click on the username in the top-right corner and select 'User Certificates'.

User Certificates

Download the configuration file by selecting your operating system as the Configuration File client and click on the 'Download' button.

For Android, choose 'Linux'.
For iOS, choose 'MacOS'.

Download the following files into the same directory as the OpenVPN configuration file above:

  1. Certificate
  2. Certificate Authority
  3. Private Key

Resetting Certificates

If for any reason you want to generate new certificates, you can hit the Reset button. You may want to do this, for example, if the user forgets his password for the PKCS12 file or the Administrator resets the ClearOS CA certificate.

Resetting the certificates does not invalidate the old ones.

Microsoft Windows[tm]

Download and install the OpenVPN client software from the OpenVPN download page. When the download is complete, double click the exe file that you downloaded to start the installation wizard. Windows will request permission to run the installer. Then you'll see the wizard start. Click Next to continue.

Click Next then Agree to the T's and Cs:

Install the recommended components

Allow OpenVPN to install in the default (recommended) path or select a location where you would like the installation files to reside.

You can safely ignore the Device Driver Installation warning…a virtual interface will be created through which, your VPN tunnels will connect. Click on the Install button.

Allow the wizard to continue through to completion. At the end of a successful install, you should see the following dialog. Click Next to continue

…. and Finish

OpenVPN will have created a desktop icon and a System Tray icon. If you choose the desktop icon it will just return a message that you have no valid configuration. You can configure OpenVPN manually by copying the four files you downloaded to the “config” folder under the OpenVPN folder where you chose to install the app (by default “C:\Program Files\OpenVPN\config”), or to “C:\Users\{user}\OpenVPN\config”. To have the config available to all users use the location under Program Files

If you imported the profile from the system tray icon, it will go into “%USERPROFILE%\OpenVPN\config” but you will need to copy your certificates there as well or you will need to use the “Alternative Method” in the Apple iOS section to assemble your certificates and keys into the .ovpn file before you import it.

Now you can start the tunnel either from the desktop icon if the system tray program is not running or from the system tray icon.

A progress dialog will be displayed, providing information on the status of the connection and a popup will appear asking for your ClearOS user name and password:

If all went according to plan, the connection dialogue will disappear and the system tray icon will change colour.

Ubuntu Linux

Download the Configuration file and Certificates as usual.

You may need the PKCS12 file containing the associated certificates instead of the individual Certificate and key files. The PKCS12 file will ask you to password protect the package the first time you use it. Don't forget this password…Your Ubuntu client will need it to extract the certificates later.

You're now done with the server/ClearOS. In Ubuntu's Network Manager, right click on the Network Manager, select Edit Connections, select the VPN tab, and click Import.

Network Manager Select the configuration file you saved earlier.

Ensure that the server hostname is accessible from outside your LAN (eg. it is not a local domain like network.lan).

Under Authentication, select type “Password with Certificates”. Populate the username and password fields with the user authentication credentials.

Under User Certificates, click on the file/folder icon and select the PKCS12 file you also downloaded from the ClearOS server. Enter the password used to authenticate the file.

Setup

Click on the Advanced button and ensure you check (enable) Use LZO Compression.

Click Apply. Your VPN settings should now be configured. It is good practice to test your connection (if possible) with the client still on the LAN. That way, if there are any problems, you have a narrow set of possibilities to troubleshoot against.

Click on the Network Manager link and select VPN Connections and the name of the VPN connection named from your ClearOS configuration.

Connect

If all goes well, you will see a lock appear on your Network Manager icon signifying the tunnel was successfully deployed.

Apple MacOS

Download the Configuration file and Certificates as usual.

Download and install the OpenVPN client software for Mac OS X from the Google Code.

Click on the Download Tunnelblick link.

Click on the latest Tunnelblick .dmg image to begin the download.

After double clicking on the dmg file you download, a dialog will open asking if you wish to proceed.

Once the application is successfully installed, you will get an pop-up notifying you. Either launch the application or find the application in your Applications folder using Finder and click on the Tunnelblick app.

When prompted with a question for config files, select I have configuration files.

Unless you are an advanced user, at the next dialog prompt, select Tunnelblick VPN Configuration.

After the step above, Tunnelblick will have created a folder for you, usually on our desktop named “Empty Tunnelblick Configuration” or something similar. Rename this folder so it is easily identifiable. Add your configuration file and certificates to this folder that you downloaded from ClearOS web-based administration tool's certificate manager.

Once done with the inline instructions, rename the folder and add the extension .tblk.

Double click on your new archive to install the configuration.

Select whether you want all users on the system access to this tunnel or just your current user.

You'll be notified that the configuration has been installed. Time to test the VPN connection.

In the upper right hand corner of your desktop, you'll see the Tunnelblick icon. Click on it once and select Connect XYZ where XYZ is the name of your OpenVPN configuration as set when you renamed the folder containing the configuration and certificates.

You'll see a status message displayed as OpenVPN attempts to connect to the ClearOS VPN server.

If all sent according to plan, you'll be notified that a connection has been made. An icon change will indicate when you are connected through the tunnel and when you are not.

Android

There are many Android clients in the Play Store. The official one is the OpenVPN Connect app and this works fine. The OpenVPN for Android by Arne Schwabe is written by one of the OpenVPN Connect developers and has more advanced tweakable parameters.

You will need to transfer all four files (configuration and three certificates) to your Android device then import the ovpn file through OpenVPN Connect the menu.

Apple iOS

The official app is 'OpenVPN Connect' and this works fine.

Using iTunes

This method for loading profiles is not so neat and needs to be done through iTunes. Connect your iOS device to your PC/Mac and select the device in iTunes.

Then select the File Sharing menu on the left and the OpenVPN app in the Apps box. Then drag and drop all four files (configuration and three certificates) into the Documents box together.

In the OpenVPN app in iOS you will then see you have a message “1 new OpenVPN profile is available for import”. You can then import it and rename it as you wish. Refer to the 'Importing the VPN Profile in OpenVPN' found below the 'Alternative Method' instructions below.

Alternative Method

There is an alternative way of importing the profile information in iOS which is also compatible with Android and Windows, but it means manipulating the .ovpn file to embed the certificates in it. It has the advantage of putting the certificates in a single file with the profile information and is therefore suitable for importing from an e-mail or browser.

If you are using Windows™ to edit the .ovpn file, the recommended application is 'Notepad++'.

From the ovpn file, remove the three lines:

ca ca-cert.pem
cert client-XXXX-cert.pem
key client-XXXX-key.pem

Your file should then look something like this:

client
remote [hostname] 1194
dev tun
proto udp
resolv-retry infinite
nobind
user nobody
group nobody
persist-key
persist-tun
ns-cert-type server
comp-lzo
verb 3
float
auth-user-pass

Be sure that your 'hostname' is defined correctly. It should match the hostname used to access ClearOS.

Then add your certificates to make the file look like:

client
remote [hostname] 1194
dev tun
proto udp
resolv-retry infinite
nobind
user nobody
group nobody
persist-key
persist-tun
ns-cert-type server
comp-lzo
verb 3
auth-user-pass

<ca>
-----BEGIN CERTIFICATE-----
copy in the CA cert here from the downloaded ca file
-----END CERTIFICATE-----
</ca>
<cert>
-----BEGIN CERTIFICATE-----
copy in the user Cert here from the downloaded cert file but only the
certificate info between the BEGIN CERTIFICATE and END CERTIFICATE lines
-----END CERTIFICATE-----
</cert>
<key>
-----BEGIN PRIVATE KEY-----
copy in the Key here from the downloaded key file
-----END PRIVATE KEY-----
</key>

Now you no longer need the separate certificate and key files. This alternative profile can be imported directly from an e-mail in iOS or, if you can put it in a location where you can browse to it, you can download it with the Safari browser.

This method should also work with Windows and Android and possibly most other operating systems. Just be sure that you modify the ovpn file relevant for your O/S.

Importing Configuration File into iOS

The instructions below are current as of iOS 10.3.3.

Open the OpenVPN configuration file from your email client or from Safari, then click on the Open button in the bottom-left corner of your screen.

Then scroll over to the 'Copy to OpenVPN' button and click on it.

Importing the VPN Profile in OpenVPN

In the OpenVPN app click on the '+' button to add the profile.

Then click 'Allow' on the popup dialog box. You'll then be asked to authenticate on iOS using your passcode, Touch ID, or Face ID.

Authenticate using the same roadwarrior username and password used on ClearOS. Then click on the slider switch to connect.

If it shows as 'Connected' but authentication fails, you've used an incorrect password. Just re-enter the correct password and it should connect correctly.
If it shows as 'Connected' at this point, you'll know your configuration file was assembled correctly.
If it doesn't connect, you'll receive an error. You should then recheck your configuration file for errors.

Once connected, you should see the screen below. To disconnect, click the slider switch once more.

ChromeOS (ChromeBook)

The best instructions for configuring a ChromeBook for OpenVPN can be found here:OpenVPN on ChromeOS

Site to Site VPN Tunnels

This section has been moved to a separate document, Connecting Networks with OpenVPN

Troubleshooting

Log Files

OpenVPN is very verbose in its logging and logs of authentications and errors will be registered to the /var/log/messages log file on the ClearOS side. On the client side it will log what is happening in the details log of the client application. These logs, while very technical, are EXTREMELY helpful in determining issues with the connection. The OpenVPN team has done a fantastic job at creating precise logs which are often the last place you need to go to find out why you cannot connect.

Cannot connect to server

Go to the OpenVPN configuration page in the web-based administration tool Service Status and ensure the service is started. If the status says Stopped, click on the Start. If the services fails to start, you can get more information from the logs. The following log files may contain clues:

  • /var/log/messages
  • /var/log/system
  • /var/log/secure

Log file contents are available for display and/or download via the web-based administration tool. You will need to install (if you haven't done so already) the Log Viewer app from the Marketplace.

If the server is also your gateway to the Internet, navigate to Incoming Firewall and ensure the OpenVPN service is an allowed incoming firewall rule (port 1194).

Incoming Firewall

Windows LAN PC does not respond through tunnel

This section is only relevant to OpenVPN in Gateway mode. In standalone mode all OpenVPN packets will appear to come from the ClearOS IP and not the OpenVPN subnet

Sometimes you will find you cannot ping a Windows device or connect to it through the tunnel. If this is the case, please check the Windows firewall. In many cases it is set by default to only allow in traffic from the local subnet and the OpenVPN subnet (default 10.8.0.0/24) does not count as local. As an example, in the Windows firewall, look at the “File and Printer Sharing (Echo Request - ICMPv4-In)” rule and its “Scope” tab. You will see it only allows the “Remote IP address” to be “Local subnet” by default. You may need to modify those rules or create a blanket rule to also allow all traffic from the OpenVPN subnet.

It may also be possible to change the settings via Group Policies - see under Local Computer Policy > Computer Configuration > Administrative Templates > Network > Network Connections > Windows Defender Firewall > Standard Profile or Domain Profile depending on your environment.

Alternatively you can enable the Additional Setting “Enable NAT”. See above.

Multi-WAN Environments

In some multi-WAN environments (eg. two external interfaces configured), OpenVPN can fail to connect from clients when the client configuration is using the default UDP. Check you have the line “multihome” in your /etc/openvpn/clients.conf. It is not needed in /etc/openvpn/clients-tcp.conf. If this does not work, try forcing the use of TCP protocol in the client, remembering to open the “OpenVPN - TCP” service (TCP:1194) in your firewall. You can do this by changing the “proto udp” line to “proto tcp” in the .ovpn file or sometimes through the GUI.

300

Connecting to a server with a Dynamic IP

If a server has a dynamic IP, for an IP change at the server to work seamlessly with the client, add a line “float” to the .ovpn file.

DNS

If you are having issues with DNS on your OpenVPN connection, it can be that you are using an external DNS server to resolve internal hosts or an internal DNS server which doesn't resolve external hosts. If you use the ClearOS gateway to resolve the DNS from its cache, you can split the resolution of external and internal domains using this guide.

VPN connects but no traffic passes

If your local and remote LAN subnets are the same or one is a subset of the other, then the VPN will establish bit no traffic will pass. For that reason it is best to avoid the 192.168.0.0/24 and 192.168.1.0/24 subnets on the ClearOS LAN as they are very common defaults on domestic routers.

Also avoid 10.8.0.0/24 and 10.8.10.0/24 as they clash with the default OpenVPN subnets (although these can easily be changed retrospectively).

If you can't change either of these then you can try forcing all traffic through OpenVPN by either adding the following to the client's .ovpn file:

redirect-gateway def1 bypass-dhcp

or add the following to /etc/openvpn/clients.conf then restart OpenVPN:

push "redirect-gateway def1 bypass-dhcp"

Connection keeps dropping ever few minutes

This is a symptom of more that one device being connected to OpenVPN with the same certificate at the same sime. By default OpenVPN does not permit this, so, when the second system connects, the first is automatically disconnected. The first then notices it has disconnected, reconnects and boots off the second an so on. if this is happening there should be a warning in the ClearOS OpenVPN logs (in /var/log/messages) with a possible solution.

The way round it is to put “duplicate-cn” in /etc/openvpn/clients.conf but it is not recommended for a couple of reasons.
1 - if you are sharing the certificate among lots of users and one machine is lost or compromised, you need to revoke the certificate and that will immediately cut everyone off rather than just one user.
2 - If the user is roaming, e.g connecting from a train, if his connection drops and reconnects, it will gain a new OpenVPN IP (typically in the 10.8.0.0/24 subnet). If he had any files open at the time on the server, the server may hold a lock on them for the old IP address. If you have one certificate per user installation then OpenVPN always tries to give the same IP address to a user certificate (see /var/lib/openvpn/ipp.txt) and this situation does not normally arise.

For these to reasons, we do not add it to the default configuration and don't recommend the parameter is used but, at the end of the day, it is a judgement call.

OpenVPN with Gateway Management/DNSThingy

If you have had any enablers or any custom firewall set up to allow LAN access by OpenVPN, since Gateway Management v2.5 was released, these are no longer necessary and can be removed

If you had an Enabler (go Rules > Enablers in the dashboard) like:

your_LAN_subnet|td0-65535,ud0-65535

It can now be removed

If you had a Custom Firewall rule with the following rule:

$IPTABLES -I FORWARD -i tun+ -j ACCEPT

It can now be removed. You may have had one rule for each LAN if you have multiple LAN's.

Similarly there used to be a mini script for a file in /etc/clearos/firewall.d/something. This can now be removed.

Softphone/VoIP issue

If you use a Softphone, it may register itself with the SIP server (e.g Shoretel) using the OpenVPN IP address, so typically a 10.8.0.x address, even if you have NAT'd the incoming OpenVPN connections, either with a firewall rule or with the webconfig option “Enable NAT”. This means your SIP server needs to kow how to route to the 10.8.0.0/24 subnet. This is especially relevant where ClearOS is in Standalone mode or has a complex network on its LAN. You may need to add extra routes to your LAN.

search?q=clearos%2C%20clearos%20content%2C%20OpenVPN%2C%20app-openvpn%2C%20clearos7%2C%20userguide%2C%20categorynetwork%2C%20subcategoryvpn%2C%20maintainer_dloper%2C%20maintainer_nhowitt&amp;btnI=lucky

content/en_us/7_ug_openvpn.txt · Last modified: 2021/03/31 10:14 by 84.9.57.48