"However from the phone I cannot connect to my LAN and WLAN subnetworks."

How did you try to "connect"?  Ping? SSH?

What address did the Android device get?  Can you ping it from the Shorewall
machine?  Can you ping the Android device from a device on the LAN? WLAN?

Only one tun device is needed for all road clients.

In my tunnels, I have:
?COMMENT openvpn
openvpnserver           inet    0.0.0.0/0

Bill


On 2/7/2018 1:27 PM, Tom Eastep wrote:
Comments interspersed below.

On 02/07/2018 05:13 AM, Bernard Drozd wrote:
Hi,
I’am trying to set up OpenVPN on newest Ubuntu server 17.10 + Shorewall
in the RoadWarrior mode:
http://shorewall.net/OPENVPN.html#RoadWarrior
To set up OpenVPN I followed  guidance below (ofcourse without firewall
part):
https://www.digitalocean.com/community/tutorials/how-to-set-up-an-openvpn-server-on-ubuntu-16-04
In the testing phase I use android phone  and ‘OpenVPN Connect’ app.
I’ve imported keys and configurations (*.ovpn file) to my mobile device.
I can connect  to OpenVPN server and see on  my mobile phone status:
connected.
However from the phone I cannot connect to my LAN and WLAN subnetworks.
I suspect that my shorewall or server Open VPN configuration need
adjustment.
Plese see my shorewall and OpenVPn server configurations and advice what
could I change to connect to my LAN network.
ela@akacja:~$ ip -o -4 addr
1: lo    inet 127.0.0.1/8 scope host lo\       valid_lft forever
preferred_lft forever
2: enp1s0    inet 192.168.15.145/24 brd 192.168.15.255 scope global
enp1s0\       valid_lft forever preferred_lft forever
4: enp3s0f1    inet 10.10.10.1/24 brd 10.10.10.255 scope global
enp3s0f1\       valid_lft forever preferred_lft forever
5: wlp4s0    inet 10.10.11.1/24 brd 10.10.11.255 scope global
wlp4s0\       valid_lft forever preferred_lft forever
6: tun0    inet 10.8.0.1 peer 10.8.0.2/32 scope global tun0\
valid_lft forever preferred_lft forever
ela@akacja:~$ ip -o -4 route
default via 192.168.15.1 dev enp1s0 proto static
10.8.0.0/24 via 10.8.0.2 dev tun0
10.8.0.2 dev tun0 proto kernel scope link src 10.8.0.1
10.10.10.0/24 dev enp3s0f1 proto kernel scope link src 10.10.10.1
10.10.11.0/24 dev wlp4s0 proto kernel scope link src 10.10.11.1
192.168.15.0/24 dev enp1s0 proto kernel scope link src 192.168.15.145
/etc/openvpn/server.conf
port 1194
proto udp
dev tun
ca ca.crt
cert server.crt
key server.key 8
dh dh2048.pem
server 10.8.0.0 255.255.255.0
ifconfig-pool-persist ipp.txt
push "route 10.10.10.0 255.255.255.0"
If you want to access the wireless LAN from VPN clients, then you also
need to push a route to 10.10.11.0 255.255.255.0.

keepalive 10 120
tls-auth ta.key 0 # This file is secret
key-direction 0
cipher AES-128-CBC
auth SHA256
user nobody
group nogroup
persist-key
persist-tun
status openvpn-status.log
verb 3
/etc/shorewall/zones:
#ZONE    TYPE    OPTIONS            IN            OUT
fw    firewall
net    ipv4
loc    ipv4
road    ipv4
/etc/shorewall/interfaces:
?FORMAT 1
###############################################################################
#ZONE    INTERFACE    BROADCAST    OPTIONS
net    enp1s0        detect    tcpflags,logmartians,nosmurfs
loc    enp3s0f1    detect    dhcp
loc    wlp4s0        detect    dhcp,maclist
road    tun0        detect
/etc/shorewall/snat:
#ACTION            SOURCE            DEST            PROTO    PORT
IPSEC    MARK    USER    SWITCH    ORIGDEST    PROBABILITY
SNAT(192.168.15.145)    10.10.10.0/24,\
             10.10.11.0/24    enp1s0
/etc/shorewall/policy:
#SOURCE        DEST        POLICY        LOG LEVEL    LIMIT:BURST
loc        net        ACCEPT
loc        $FW        ACCEPT
$FW        net        ACCEPT
$FW        loc        ACCEPT
road        loc        ACCEPT
You might also want:

loc     road    ACCEPT

net        all        DROP        info
all        all        REJECT        info
/etc/shorewall/tunnels:
#TYPE         ZONE           GATEWAY        GATEWAY_ZONE
openvpn:1194  net            0.0.0.0/0


/etc/shorewall/rules:
#ACTION        SOURCE        DEST        PROTO    DEST    SOURCE
ORIGINAL    RATE        USER/    MARK    CONNLIMIT    TIME
HEADERS        SWITCH        HELPER
#                            PORT    PORT(S)        DEST
LIMIT        GROUP
?SECTION ALL
?SECTION ESTABLISHED
?SECTION RELATED
?SECTION INVALID
?SECTION UNTRACKED
?SECTION NEW
#       Don't allow connection pickup from the net
#
Invalid(DROP)    net        all        tcp
#
#    Accept DNS connections from the firewall to the network
#
#DNS(ACCEPT)    $FW        net
#
#    Accept SSH connections from the local network for administration
#
SSH(ACCEPT)    loc        $FW
#
#    Allow Ping from the local network
#
Ping(ACCEPT)    loc        $FW
#
# Drop Ping from the "bad" net zone.. and prevent your log from being
flooded..
#
Ping(DROP)    net        $FW ACCEPT        $FW        loc        icmp
ACCEPT        $FW        net        icmp
#
#
ACCEPT        net        $FW        tcp        6535
ACCEPT        net        $FW        udp        6534
ACCEPT        net        $FW        tcp        1007
ACCEPT        net        $FW        tcp        2225
ACCEPT        net        $FW        udp        1194
That rule is redundant - the tunnels file entry does that.

It's been years since I used VPN, but I notice in my article at
http://www.shorewall.org/OpenVPN.html#RoadWarrior that my interfaces
entry for the vpn zone is:

road       tun+

rather than

road       tun0

I seem to recall that, when using tun interfaces, a separate interface
is created for each client.

Hope that helps,

-Tom


------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot


_______________________________________________
Shorewall-users mailing list
Shorewall-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/shorewall-users


------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Shorewall-users mailing list
Shorewall-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to