I edited with winSCP
It worked after reboot! Yes!!!
I was about to say...
STOP.
- Have you actually Saved or Applied anything???
- Do you know how?
You found a new bug. It must be a problem with WRT32X or Davidc502
Please change general forwarding back to REJECT and retest.
I applied with Winscp
It rewrites the file
You've mentioned that twice, I guess this means no.
After you copy a file, there are multiple ways to commit from command line. But rebooting has no ill effects in the method you're employing.
So will it work now? I tried my Moonlight Game Streaming and it works, but will it be bad in the long term?
@BinaryDoge, please follow my instructions:
I don't agree with you (just yet).
Yes, this setting is very dangerous, it was temporary and for testing purposes only!
Ok, I will reset that option and reboot. How can I apply this option correctly so it wouldnt be dangerous?
I need to know if it works after rebooting, first.
I think you didn't write the addition of the tun0 portion of the LAN firewall zone properly.
/etc/init.d/firewall reload
Follow the troubleshooting section of the guide.
30+ posts wasted and still no log.
Doesnt work after reboot
How can I get a log
https://openwrt.org/docs/guide-user/services/vpn/openvpn/server#troubleshooting
Restart the server, try to connect the client, check client and server logs.
I am on the Davidc502 firmware, so I will try to install stock openwrt
OK...but unsure why you don't wanna provide logs...
I hope you're not doing that because you believe there's some bug you convinced yourself of.
EDIT: I was gonna add, I'm not familiar in OpenVPN on OpenWrt specifically, it was my understanding the instructions properly set up this forwarding.
If not, I was simply gonna suggest re-configuring the firewall to add tun0 to its own firewall zone, and permit forwarding to/from LAN.
You have not created a vpn network device (in /etc/config/network), nor have you created the appropriate vpn firewall zone and fowardings.
You also need a route to the LAN from the OpenVPN tunnel.
add to /etc/config/network
config interface 'vpn0'
option proto 'none'
option ifname 'tun0'
add to /etc/config/firewall
config zone
option name 'vpn'
option input 'ACCEPT'
option output 'ACCEPT'
option forward 'REJECT'
option network 'vpn0'
config forwarding
option dest 'lan'
option src 'vpn'
config forwarding
option dest 'wan'
option src 'vpn'
add to openvpn server config file
push "route 192.168.1.0 255.255.255.0"
P.S. Also, when testing internet connectivity, you really need to use a trace route application, otherwise you don't know what route your packets are taking (direct to the internet, or through the tunnel and then out to the internet).
No, I just can't figure out what type of log you need. The logs show no true errors, only connection confirmations