Client connected to TO OVPN server, but unable to access LAN

I’ve connected an android client to my TO openvpn server, but I cannot ping any LAN IP address.

Can someone help explain to me what I need to change in the TO firewall to allow for LAN access from my openvpn client? Any guidance would be greatly appreciated!!

I followed these instructions: https://doc.turris.cz/doc/en/howto/openvpn_plugin

I can connect my notebook but I cannot connect my PC correctly.
There is something strange with OVPN indeed.

For anyone willing to assist, here are my firewall settings:

############## firewall
firewall.@defaults[0]=defaults
firewall.@defaults[0].syn_flood=‘1’
firewall.@defaults[0].input=‘ACCEPT’
firewall.@defaults[0].output=‘ACCEPT’
firewall.@defaults[0].forward=‘REJECT’
firewall.@zone[0]=zone
firewall.@zone[0].name=‘lan’
firewall.@zone[0].network=‘lan’
firewall.@zone[0].input=‘ACCEPT’
firewall.@zone[0].output=‘ACCEPT’
firewall.@zone[0].forward=‘ACCEPT’
firewall.@zone[0].device=‘tun0’
firewall.@zone[1]=zone
firewall.@zone[1].name=‘wan’
firewall.@zone[1].network=‘wan’ ‘wan6’
firewall.@zone[1].input=‘REJECT’
firewall.@zone[1].output=‘ACCEPT’
firewall.@zone[1].forward=‘REJECT’
firewall.@zone[1].masq=‘1’
firewall.@zone[1].mtu_fix=‘1’
firewall.@forwarding[0]=forwarding
firewall.@forwarding[0].src=‘lan’
firewall.@forwarding[0].dest=‘wan’
firewall.@rule[0]=rule
firewall.@rule[0].name=‘Allow-DHCP-Renew’
firewall.@rule[0].src=‘wan’
firewall.@rule[0].proto=‘udp’
firewall.@rule[0].dest_port=‘68’
firewall.@rule[0].target=‘ACCEPT’
firewall.@rule[0].family=‘ipv4’
firewall.@rule[1]=rule
firewall.@rule[1].name=‘Allow-Ping’
firewall.@rule[1].src=‘wan’
firewall.@rule[1].proto=‘icmp’
firewall.@rule[1].icmp_type=‘echo-request’
firewall.@rule[1].family=‘ipv4’
firewall.@rule[1].target=‘ACCEPT’
firewall.@rule[2]=rule
firewall.@rule[2].name=‘Allow-IGMP’
firewall.@rule[2].src=‘wan’
firewall.@rule[2].proto=‘igmp’
firewall.@rule[2].family=‘ipv4’
firewall.@rule[2].target=‘ACCEPT’
firewall.@rule[3]=rule
firewall.@rule[3].name=‘Allow-DHCPv6’
firewall.@rule[3].src=‘wan’
firewall.@rule[3].proto=‘udp’
firewall.@rule[3].src_ip=‘fe80::/10’
firewall.@rule[3].src_port=‘547’
firewall.@rule[3].dest_ip=‘fe80::/10’
firewall.@rule[3].dest_port=‘546’
firewall.@rule[3].family=‘ipv6’
firewall.@rule[3].target=‘ACCEPT’
firewall.@rule[4]=rule
firewall.@rule[4].name=‘Allow-MLD’
firewall.@rule[4].src=‘wan’
firewall.@rule[4].proto=‘icmp’
firewall.@rule[4].src_ip=‘fe80::/10’
firewall.@rule[4].icmp_type=‘130/0’ ‘131/0’ ‘132/0’ ‘143/0’
firewall.@rule[4].family=‘ipv6’
firewall.@rule[4].target=‘ACCEPT’
firewall.@rule[5]=rule
firewall.@rule[5].name=‘Allow-ICMPv6-Input’
firewall.@rule[5].src=‘wan’
firewall.@rule[5].proto=‘icmp’
firewall.@rule[5].icmp_type=‘echo-request’ ‘echo-reply’ ‘destination-unreachable’ ‘packet-too-big’ ‘time-exceeded’ ‘bad-header’ ‘unknown-header-type’ ‘router-solicitation’ ‘neighbour-solicitation’ ‘router-advertisement’ ‘neighbour-advertisement’
firewall.@rule[5].limit=‘1000/sec’
firewall.@rule[5].family=‘ipv6’
firewall.@rule[5].target=‘ACCEPT’
firewall.@rule[6]=rule
firewall.@rule[6].name=‘Allow-ICMPv6-Forward’
firewall.@rule[6].src=‘wan’
firewall.@rule[6].dest=’*’
firewall.@rule[6].proto=‘icmp’
firewall.@rule[6].icmp_type=‘echo-request’ ‘echo-reply’ ‘destination-unreachable’ ‘packet-too-big’ ‘time-exceeded’ ‘bad-header’ ‘unknown-header-type’
firewall.@rule[6].limit=‘1000/sec’
firewall.@rule[6].family=‘ipv6’
firewall.@rule[6].target=‘ACCEPT’
firewall.@include[0]=include
firewall.@include[0].path=’/etc/firewall.user’
firewall.@include[1]=include
firewall.@include[1].path=’/usr/share/firewall/turris’
firewall.@include[1].reload=‘1’
firewall.@include[2]=include
firewall.@include[2].path=’/etc/firewall.d/with_reload/firewall.include.sh’
firewall.@include[2].reload=‘1’
firewall.@include[3]=include
firewall.@include[3].path=’/etc/firewall.d/without_reload/firewall.include.sh’
firewall.@include[3].reload=‘0’
firewall.@rule[7]=rule
firewall.@rule[7].src=‘wan’
firewall.@rule[7].dest=‘lan’
firewall.@rule[7].proto=‘esp’
firewall.@rule[7].target=‘ACCEPT’
firewall.@rule[8]=rule
firewall.@rule[8].src=‘wan’
firewall.@rule[8].dest=‘lan’
firewall.@rule[8].dest_port=‘500’
firewall.@rule[8].proto=‘udp’
firewall.@rule[8].target=‘ACCEPT’
firewall.guest_turris=zone
firewall.guest_turris.enabled=‘0’
firewall.guest_turris.name=‘guest_turris’
firewall.guest_turris.input=‘REJECT’
firewall.guest_turris.forward=‘REJECT’
firewall.guest_turris.output=‘ACCEPT’
firewall.guest_turris.network=‘guest_turris’
firewall.guest_turris_forward_wan=forwarding
firewall.guest_turris_forward_wan.enabled=‘0’
firewall.guest_turris_forward_wan.name=‘guest to wan forward’
firewall.guest_turris_forward_wan.src=‘guest_turris’
firewall.guest_turris_forward_wan.dest=‘wan’
firewall.guest_turris_dns_rule=rule
firewall.guest_turris_dns_rule.enabled=‘0’
firewall.guest_turris_dns_rule.name=‘guest dns rule’
firewall.guest_turris_dns_rule.src=‘guest_turris’
firewall.guest_turris_dns_rule.proto=‘tcpudp’
firewall.guest_turris_dns_rule.dest_port=‘53’
firewall.guest_turris_dns_rule.target=‘ACCEPT’
firewall.guest_turris_dhcp_rule=rule
firewall.guest_turris_dhcp_rule.enabled=‘0’
firewall.guest_turris_dhcp_rule.name=‘guest dhcp rule’
firewall.guest_turris_dhcp_rule.src=‘guest_turris’
firewall.guest_turris_dhcp_rule.proto=‘udp’
firewall.guest_turris_dhcp_rule.src_port=‘67-68’
firewall.guest_turris_dhcp_rule.dest_port=‘67-68’
firewall.guest_turris_dhcp_rule.target=‘ACCEPT’
firewall.miniupnpd=include
firewall.miniupnpd.type=‘script’
firewall.miniupnpd.path=’/usr/share/miniupnpd/firewall.include’
firewall.miniupnpd.family=‘any’
firewall.miniupnpd.reload=‘1’
firewall.vpn_turris=zone
firewall.vpn_turris.enabled=‘1’
firewall.vpn_turris.name=‘vpn_turris’
firewall.vpn_turris.input=‘ACCEPT’
firewall.vpn_turris.output=‘ACCEPT’
firewall.vpn_turris.masq=‘1’
firewall.vpn_turris.forward=‘REJECT’
firewall.vpn_turris.network=‘vpn_turris’
firewall.vpn_turris_rule=rule
firewall.vpn_turris_rule.name=‘vpn_turris_rule’
firewall.vpn_turris_rule.target=‘ACCEPT’
firewall.vpn_turris_rule.proto=‘udp’
firewall.vpn_turris_rule.src=‘wan’
firewall.vpn_turris_rule.dest_port=‘1194’
firewall.vpn_turris_rule.enabled=‘1’
firewall.@forwarding[1]=forwarding
firewall.@forwarding[1].dest=‘lan’
firewall.@forwarding[1].src=‘vpn_turris’
firewall.@forwarding[2]=forwarding
firewall.@forwarding[2].dest=‘wan’
firewall.@forwarding[2].src=‘vpn_turris’
firewall.@forwarding[3]=forwarding
firewall.@forwarding[3].dest=‘vpn_turris’
firewall.@forwarding[3].src=‘lan’
firewall.vpn_turris_forward_lan_in=forwarding
firewall.vpn_turris_forward_lan_in.enabled=‘1’
firewall.vpn_turris_forward_lan_in.src=‘vpn_turris’
firewall.vpn_turris_forward_lan_in.dest=‘lan’
firewall.vpn_turris_forward_lan_out=forwarding
firewall.vpn_turris_forward_lan_out.enabled=‘1’
firewall.vpn_turris_forward_lan_out.src=‘lan’
firewall.vpn_turris_forward_lan_out.dest=‘vpn_turris’
firewall.vpn_turris_forward_wan_out=forwarding
firewall.vpn_turris_forward_wan_out.enabled=‘0’
firewall.vpn_turris_forward_wan_out.src=‘vpn_turris’
firewall.vpn_turris_forward_wan_out.dest=‘wan’

Solved after adding option “client-to-client” to the ‘server_turris’ openvpn configuration.

Can this ‘client-to-client’ option be added to the Foris plugin, please?

1 Like

where exactly did you applied it?

/etc/config/openvpn

I added “option client-to-client” within the very last configuration in the file named ‘server_turris’

@nlx6 Your suggestion fixed it for me, but made Foris throw an error about invalid characters. It turned out Foris doesn’t like - in the openvpn config and one has to replace them with _.

In conclusion:

I had to rename client-to-client to client_to_client and added a ‘1’ for a complete config line appended to the very last configuration in /etc/config/openvpn:

option client_to_client '1'