Hello everyone,
I have OpenWrt SNAPSHOT installed r6873-cf7a88c / LuCI Master (git-18.131.66371-1e39fef) in a xiaomi-3g router, the stable version is not available
My ISP provides the data by the vlan with id 832
I followed this guide to configure OpenVPN https://openwrt.org/docs/guide-user/services/vpn/openvpn/server.setup, clients connect to the server but do not have access to LAN or the internet, it does not solve pings
ping 8.8.8.8
PING 8.8.8.8 (8.8.8.8) 56(84) bytes of data.
traceroute to 8.8.8.8 (8.8.8.8), 30 hops max, 60 byte packets
1 * * *
2 * * *
3 * * *
4 * * *
5 * * *
6 * * *
28 * * *
29 * * *
30 * * *
My configurations and logs:
/etc/config/network
config interface 'loopback'
option ifname 'lo'
option proto 'static'
option ipaddr '127.0.0.1'
option netmask '255.0.0.0'
config globals 'globals'
config interface 'lan'
option type 'bridge'
option proto 'static'
option ipaddr '192.168.1.1'
option netmask '255.255.255.0'
option ip6assign '60'
option ifname 'eth0.1'
config device 'lan_dev'
option name 'eth0.1'
option macaddr 'xx:xx:xx:xx'
config interface 'wan'
option proto 'dhcp'
option _orig_ifname 'eth0.2'
option _orig_bridge 'false'
option ifname 'eth0.832'
config interface 'wan6'
option _orig_ifname 'eth0.2'
option _orig_bridge 'false'
option ifname 'eth0.832'
option proto 'dhcpv6'
option reqaddress 'try'
option reqprefix 'auto'
option auto '0'
config switch
option name 'switch0'
option reset '1'
option enable_vlan '1'
config switch_vlan
option device 'switch0'
option vlan '1'
option ports '2 3 6t'
option vid '1'
config switch_vlan
option device 'switch0'
option vlan '3'
option ports '1t 6t'
option vid '832'
config interface 'vpnserver'
option proto 'none'
option ifname 'ovpns0'
option auto '1'
/etc/config/openvpn
config openvpn 'vpnserver'
option dev_type 'tun'
option dev 'ovpns0'
option port 'XXXX'
option comp_lzo 'yes'
option keepalive '10 120'
option persist_key '1'
option persist_tun '1'
option mode 'server'
option tls_server '1'
option server '192.168.200.0 255.255.255.0'
option topology 'subnet'
option route_gateway 'dhcp'
option client_to_client '1'
list push 'comp-lzo yes'
list push 'persist-key'
list push 'persist-tun'
list push 'topology subnet'
list push 'route-gateway dhcp'
list push 'redirect-gateway def1'
list push 'route 192.168.200.0 255.255.255.0'
list push 'dhcp-option DNS 192.168.1.1'
list push 'redirect-gateway def1 bypass-dhcp'
option ca '/etc/openvpn/ca.crt'
option cert '/etc/openvpn/OpenVPN.crt'
option key '/etc/openvpn/OpenVPN.key'
option dh '/etc/openvpn/dh2048.pem'
option tls_auth '/etc/openvpn/tls-auth.key 0'
option duplicate_cn '1'
option enabled '1'
option verb '5'
client
client
dev tun
proto udp
fast-io
remote domain.org XXXX
remote-cert-tls server
nobind
persist-key
persist-tun
comp-lzo no
verb 7
key-direction 1
firewall
config rule
option name 'Allow-DHCP-Renew'
option src 'wan'
option proto 'udp'
option dest_port '68'
option target 'ACCEPT'
option family 'ipv4'
config rule
option name 'Allow-Ping'
option src 'wan'
option proto 'icmp'
option icmp_type 'echo-request'
option family 'ipv4'
option target 'ACCEPT'
config rule
option name 'Allow-IGMP'
option src 'wan'
option proto 'igmp'
option family 'ipv4'
option target 'ACCEPT'
config rule
option name 'Allow-DHCPv6'
option src 'wan'
option proto 'udp'
option src_ip 'fc00::/6'
option dest_ip 'fc00::/6'
option dest_port '546'
option family 'ipv6'
option target 'ACCEPT'
config rule
option name 'Allow-MLD'
option src 'wan'
option proto 'icmp'
option src_ip 'fe80::/10'
list icmp_type '130/0'
list icmp_type '131/0'
list icmp_type '132/0'
list icmp_type '143/0'
option family 'ipv6'
option target 'ACCEPT'
config rule
option name 'Allow-ICMPv6-Input'
option src 'wan'
option proto 'icmp'
list icmp_type 'echo-request'
list icmp_type 'echo-reply'
list icmp_type 'destination-unreachable'
list icmp_type 'packet-too-big'
list icmp_type 'time-exceeded'
list icmp_type 'bad-header'
list icmp_type 'unknown-header-type'
list icmp_type 'router-solicitation'
list icmp_type 'neighbour-solicitation'
list icmp_type 'router-advertisement'
list icmp_type 'neighbour-advertisement'
option limit '1000/sec'
option family 'ipv6'
option target 'ACCEPT'
config rule
option name 'Allow-ICMPv6-Forward'
option src 'wan'
option dest '*'
option proto 'icmp'
list icmp_type 'echo-request'
list icmp_type 'echo-reply'
list icmp_type 'destination-unreachable'
list icmp_type 'packet-too-big'
list icmp_type 'time-exceeded'
list icmp_type 'bad-header'
list icmp_type 'unknown-header-type'
option limit '1000/sec'
option family 'ipv6'
option target 'ACCEPT'
config rule
option name 'Allow-IPSec-ESP'
option src 'wan'
option dest 'lan'
option proto 'esp'
option target 'ACCEPT'
config rule
option name 'Allow-ISAKMP'
option src 'wan'
option dest 'lan'
option dest_port '500'
option proto 'udp'
option target 'ACCEPT'
config rule
option name 'Allow-OpenVPN-Inbound'
option target 'ACCEPT'
option src '*'
option dest_port '1194'
option proto 'udp'
config defaults
option syn_flood '1'
option input 'ACCEPT'
option output 'ACCEPT'
option forward 'REJECT'
config zone
option name 'lan'
option input 'ACCEPT'
option output 'ACCEPT'
option forward 'ACCEPT'
option network 'lan'
config zone
option name 'wan'
option input 'REJECT'
option output 'ACCEPT'
option forward 'REJECT'
option masq '1'
option mtu_fix '1'
option network 'wan wan6'
config include
option path '/etc/firewall.user'
config zone
option name 'vpnserver'
option input 'ACCEPT'
option output 'ACCEPT'
option network 'vpnserver'
option masq '1'
option forward 'REJECT'
config forwarding
option dest 'wan'
option src 'lan'
config forwarding
option dest 'wan'
option src 'invitados'
config forwarding
option dest 'lan'
option src 'vpnserver'
config forwarding
option dest 'wan'
option src 'vpnserver'
config forwarding
option dest 'vpnserver'
option src 'lan'
log
Sat May 12 21:15:53 2018 daemon.notice openvpn(vpnserver)[3253]: MULTI: multi_create_instance called
Sat May 12 21:15:53 2018 daemon.notice openvpn(vpnserver)[3253]: 192.168.1.5:37009 Re-using SSL/TLS context
Sat May 12 21:15:53 2018 daemon.notice openvpn(vpnserver)[3253]: 192.168.1.5:37009 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
Sat May 12 21:15:53 2018 daemon.notice openvpn(vpnserver)[3253]: 192.168.1.5:37009 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
Sat May 12 21:15:53 2018 daemon.notice openvpn(vpnserver)[3253]: 192.168.1.5:37009 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server'
Sat May 12 21:15:53 2018 daemon.notice openvpn(vpnserver)[3253]: 192.168.1.5:37009 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client'
Sat May 12 21:15:53 2018 daemon.notice openvpn(vpnserver)[3253]: 192.168.1.5:37009 TLS: Initial packet from [AF_INET]192.168.1.5:37009, sid=b6bf028b fe907110
Sat May 12 21:15:54 2018 daemon.notice openvpn(vpnserver)[3253]: 192.168.1.5:37009 VERIFY OK: depth=1, C=xx, ST=xxxxx, O=xxxxxxx
Sat May 12 21:15:54 2018 daemon.notice openvpn(vpnserver)[3253]: 192.168.1.5:37009 VERIFY OK: depth=0, CN=xxxxx
Sat May 12 21:15:54 2018 daemon.notice openvpn(vpnserver)[3253]: 192.168.1.5:37009 peer info: IV_VER=2.4.6
Sat May 12 21:15:54 2018 daemon.notice openvpn(vpnserver)[3253]: 192.168.1.5:37009 peer info: IV_PLAT=linux
Sat May 12 21:15:54 2018 daemon.notice openvpn(vpnserver)[3253]: 192.168.1.5:37009 peer info: IV_PROTO=2
Sat May 12 21:15:54 2018 daemon.notice openvpn(vpnserver)[3253]: 192.168.1.5:37009 peer info: IV_NCP=2
Sat May 12 21:15:54 2018 daemon.notice openvpn(vpnserver)[3253]: 192.168.1.5:37009 peer info: IV_LZ4=1
Sat May 12 21:15:54 2018 daemon.notice openvpn(vpnserver)[3253]: 192.168.1.5:37009 peer info: IV_LZ4v2=1
Sat May 12 21:15:54 2018 daemon.notice openvpn(vpnserver)[3253]: 192.168.1.5:37009 peer info: IV_LZO=1
Sat May 12 21:15:54 2018 daemon.notice openvpn(vpnserver)[3253]: 192.168.1.5:37009 peer info: IV_COMP_STUB=1
Sat May 12 21:15:54 2018 daemon.notice openvpn(vpnserver)[3253]: 192.168.1.5:37009 peer info: IV_COMP_STUBv2=1
Sat May 12 21:15:54 2018 daemon.notice openvpn(vpnserver)[3253]: 192.168.1.5:37009 peer info: IV_TCPNL=1
Sat May 12 21:15:54 2018 daemon.warn openvpn(vpnserver)[3253]: 192.168.1.5:37009 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1541', remote='link-mtu 1542'
Sat May 12 21:15:54 2018 daemon.warn openvpn(vpnserver)[3253]: 192.168.1.5:37009 WARNING: 'comp-lzo' is present in remote config but missing in local config, remote='comp-lzo'
Sat May 12 21:15:54 2018 daemon.notice openvpn(vpnserver)[3253]: 192.168.1.5:37009 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Sat May 12 21:15:54 2018 daemon.notice openvpn(vpnserver)[3253]: 192.168.1.5:37009 [cliente] Peer Connection Initiated with [AF_INET]192.168.1.5:37009
Sat May 12 21:15:54 2018 daemon.notice openvpn(vpnserver)[3253]: cliente/192.168.1.5:37009 MULTI_sva: pool returned IPv4=192.168.200.2, IPv6=(Not enabled)
Sat May 12 21:15:54 2018 daemon.notice openvpn(vpnserver)[3253]: cliente/192.168.1.5:37009 MULTI: Learn: 192.168.200.2 -> cliente/192.168.1.5:37009
Sat May 12 21:15:54 2018 daemon.notice openvpn(vpnserver)[3253]: cliente/192.168.1.5:37009 MULTI: primary virtual IP for cliente/192.168.1.5:37009: 192.168.200.2
Sat May 12 21:15:55 2018 daemon.notice openvpn(vpnserver)[3253]: cliente/192.168.1.5:37009 PUSH: Received control message: 'PUSH_REQUEST'
Sat May 12 21:15:55 2018 daemon.notice openvpn(vpnserver)[3253]: cliente/192.168.1.5:37009 SENT CONTROL [cliente]: 'PUSH_REPLY,comp-lzo yes,persist-key,persist-tun,topology subnet,route-gateway dhcp,redirect-gateway def1,route 192.168.200.0 255.255.255.0,dhcp-option DNS 192.168.1.1,redirect-gateway def1 bypass-dhcp,route-gateway 192.168.200.1,topology subnet,ping 10,ping-restart 120,ifconfig 192.168.200.2 255.255.255.0,peer-id 0,cipher AES-256-GCM' (status=1)
Sat May 12 21:15:55 2018 daemon.notice openvpn(vpnserver)[3253]: cliente/192.168.1.5:37009 Data Channel: using negotiated cipher 'AES-256-GCM'
Sat May 12 21:15:55 2018 daemon.notice openvpn(vpnserver)[3253]: cliente/192.168.1.5:37009 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
Sat May 12 21:15:55 2018 daemon.notice openvpn(vpnserver)[3253]: cliente/192.168.1.5:37009 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Sat May 12 21:15:55 2018 daemon.notice openvpn(vpnserver)[3253]: cliente/192.168.1.5:37009 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Sat May 12 21:15:55 2018 daemon.warn openvpn(vpnserver)[3253]: cliente/192.168.1.5:37009 IP packet with unknown IP version=15 seen
Sat May 12 21:15:55 2018 daemon.notice openvpn(vpnserver)[3253]: cliente/192.168.1.5:37009 MULTI: bad source address from client [1140:40:1148:19c0:a8c8:2ff:ffff:ff06], packet dropped
Sat May 12 21:15:56 2018 daemon.warn openvpn(vpnserver)[3253]: cliente/192.168.1.5:37009 IP packet with unknown IP version=15 seen
Sat May 12 21:15:56 2018 daemon.warn openvpn(vpnserver)[3253]: cliente/192.168.1.5:37009 IP packet with unknown IP version=15 seen
Sat May 12 21:15:56 2018 daemon.warn openvpn(vpnserver)[3253]: cliente/192.168.1.5:37009 IP packet with unknown IP version=15 seen
Sat May 12 21:15:56 2018 daemon.warn openvpn(vpnserver)[3253]: cliente/192.168.1.5:37009 IP packet with unknown IP version=15 seen
Sat May 12 21:15:56 2018 daemon.warn openvpn(vpnserver)[3253]: cliente/192.168.1.5:37009 IP packet with unknown IP version=15 seen
Sat May 12 21:15:56 2018 daemon.warn openvpn(vpnserver)[3253]: cliente/192.168.1.5:37009 IP packet with unknown IP version=15 seen
Sat May 12 21:15:57 2018 daemon.warn openvpn(vpnserver)[3253]: cliente/192.168.1.5:37009 IP packet with unknown IP version=15 seen
Sat May 12 21:15:57 2018 daemon.warn openvpn(vpnserver)[3253]: cliente/192.168.1.5:37009 IP packet with unknown IP version=15 seen
Sat May 12 21:15:57 2018 daemon.warn openvpn(vpnserver)[3253]: cliente/192.168.1.5:37009 IP packet with unknown IP version=15 seen
Sat May 12 21:15:57 2018 daemon.warn openvpn(vpnserver)[3253]: cliente/192.168.1.5:37009 IP packet with unknown IP version=15 seen
Sat May 12 21:15:57 2018 daemon.warn openvpn(vpnserver)[3253]: cliente/192.168.1.5:37009 IP packet with unknown IP version=15 seen
Sat May 12 21:15:57 2018 daemon.warn openvpn(vpnserver)[3253]: cliente/192.168.1.5:37009 IP packet with unknown IP version=15 seen
Sat May 12 21:15:57 2018 daemon.warn openvpn(vpnserver)[3253]: cliente/192.168.1.5:37009 IP packet with unknown IP version=15 seen
Sat May 12 21:15:58 2018 daemon.warn openvpn(vpnserver)[3253]: cliente/192.168.1.5:37009 IP packet with unknown IP version=15 seen
Sat May 12 21:15:58 2018 daemon.warn openvpn(vpnserver)[3253]: cliente/192.168.1.5:37009 IP packet with unknown IP version=15 seen
Sat May 12 21:15:59 2018 daemon.warn openvpn(vpnserver)[3253]: cliente/192.168.1.5:37009 IP packet with unknown IP version=15 seen
Sat May 12 21:15:59 2018 daemon.warn openvpn(vpnserver)[3253]: cliente/192.168.1.5:37009 IP packet with unknown IP version=15 seen
Sat May 12 21:15:59 2018 daemon.warn openvpn(vpnserver)[3253]: cliente/192.168.1.5:37009 IP packet with unknown IP version=15 seen
Sat May 12 21:15:59 2018 daemon.warn openvpn(vpnserver)[3253]: cliente/192.168.1.5:37009 IP packet with unknown IP version=15 seen
Sat May 12 21:15:59 2018 daemon.warn openvpn(vpnserver)[3253]: cliente/192.168.1.5:37009 IP packet with unknown IP version=15 seen
I would be very grateful if you helped me with this error, thank you very much