DDWRT OpenVPN routed

Steelerz37

Senior member
Feb 15, 2003
693
0
0
I recently had to replace 1 of my dd-wrt openvpn routers and decided to take the opportunity to convert to public private keys. I previsouly had a static key VPN configured and working well for quite a while.

It looks to me like my certificates and pub/priv keys are all working just fine, as soon as I power on the DD-WRT OpenVPN server[server] the DD-WRT OpenVPN client[client1] connects and gets a private address, but I am not able to connect or ping any devices on the client1 lan.
So I think I think my problem is either in routing or the iptables firewall on either server or client1. My knowledge of iptables and routing is very minimal

I have been following the vpn guide at:
http://www.dd-wrt.com/wiki/index.php/VPN_%28the_easy_way)_v24+#Enough_NVRAM_storage_space.3F


I'll try to explain my configuration as best as possible:

Server:
Linksys WRT54G
LAN: 192.168.3.x
VPN Private Routing: 192.168.66.0

OpenVPN Server Config Script:
##################################################
push "route 192.168.3.0 255.255.255.0"
server 192.168.66.0 255.255.255.0

dev tun0
proto udp
keepalive 10 120
dh /tmp/openvpn/dh.pem
ca /tmp/openvpn/ca.crt
cert /tmp/openvpn/cert.pem
key /tmp/openvpn/key.pem

# Only use crl-verify if you are using the revoke list - otherwise leave it commented out
# crl-verify /tmp/openvpn/ca.crl

# management parameter allows DD-WRT\s OpenVPN Status web page to access the server\s management port
# port must be 5001 for scripts embedded in firmware to work
management localhost 5001
##################################################

IPTABLES:
iptables -I INPUT 1 -p udp --dport 1194 -j ACCEPT
iptables -I FORWARD 1 --source 192.168.66.0/24 -j ACCEPT
iptables -I FORWARD -i br0 -o tun0 -j ACCEPT
iptables -I FORWARD -i tun0 -o br0 -j ACCEPT


*****************************************************************
Client1
Linksys WRT54G
LAN: 192.168.2.x
VPN Private Routing: 192.168.66.0
IPTABLES:
NONE
 
Last edited:

Steelerz37

Senior member
Feb 15, 2003
693
0
0
I did some modifications to the openvpn server config file and think i am closer, here is the new config:
push "route 192.168.3.0 255.255.255.0"
push "route 192.168.2.0 255.255.255.0"
route 192.168.2.0 255.255.255.0
client-config-dir /tmp/openvpn/ccd
server 192.168.66.0 255.255.255.0

dev tun0
proto udp
keepalive 10 120
dh /tmp/openvpn/dh.pem
ca /tmp/openvpn/ca.crt
cert /tmp/openvpn/cert.pem
key /tmp/openvpn/key.pem

# Only use crl-verify if you are using the revoke list
# crl-verify /tmp/openvpn/ca.crl

# management parameter allows DD-WRT's OpenVPN Status web
# port must be 5001 for scripts embedded in firmware to work
management localhost 5001


Now when I do a traceroute from 192.168.3.0 to 192.168.2.0 I see the route go over the 192.168.66.0 network, so I think I need to add the same iptables commands to the client as i am already running on the server.