Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision | |||
userdoc:openvpn_access [2017/08/10 03:41] droemel |
userdoc:openvpn_access [2017/08/10 03:43] (current) droemel |
||
---|---|---|---|
Line 10: | Line 10: | ||
* In the Firewall config "Allow OpenVPN Server tunnel to xx LAN Interface" | * In the Firewall config "Allow OpenVPN Server tunnel to xx LAN Interface" | ||
- | * The iptables rules should be put into "''/ | + | * The iptables rules should be put into ''/ |
* Because the limited users have still access to the Astlinux server itself, you could either | * Because the limited users have still access to the Astlinux server itself, you could either | ||
- | * create a Firewall rule like "'' | + | * create a Firewall rule like '' |
- | * or create another iptables rule: "'' | + | * or create another iptables rule: '' |
- | * The easy way is to push the internal LAN route in the OpenVPN server config (//push route 192.168.3.0.255.255.255.0 in this case//). | + | * The easy way is to push the internal LAN route in the OpenVPN server config (// |
- | * The more secure way is NOT to push the route in the OpenVPN server config, but instead push only the relevant allowed destinations in the OpenVPN ccd/client file like "'' | + | * The more secure way is NOT to push the route in the OpenVPN server config, but instead push only the relevant allowed destinations in the OpenVPN ccd/client file like '' |
=== Examples === | === Examples === | ||
Line 47: | Line 47: | ||
ifconfig-push 10.8.1.1 10.8.1.2 | ifconfig-push 10.8.1.1 10.8.1.2 | ||
- | ;push route 192.168.3.0 255.255.255.0 | + | ;push "route 192.168.3.0 255.255.255.0" |
**/ | **/ |