FR365 OpenVPN Client

FR365 OpenVPN Client

FR365 OpenVPN Client
FR365 OpenVPN Client
Thursday - last edited Yesterday
Model: FR365  
Hardware Version: V1
Firmware Version: 1.13

I have an FR365 I want to connect to an external VPS OpenVPN server running Connect 3.01, so a VPN client connection from the FR365. I eventually got a VPN policy configured, various .ovpn files, but it's not working, I don't see any connection attempt on the server via tcpdump from the client. 
 

I can ping the VPS from the FR365 and everything else on the gateway works. 

The ovpn works from my laptop to the server.

 

Any suggestions?

 

Pasting my redacted ovpn

 

cipher AES-256-CBC

client

server-poll-timeout 4

nobind

remote XXX.XXX.XXX.XXX 1194 udp

dev tun

dev-type tun

remote-cert-tls server

tls-version-min 1.2

reneg-sec 604800

tun-mtu 1420

verb 3

push-peer-info

tls-auth ta.key 1

<ca>

-----BEGIN CERTIFICATE-----

-----END CERTIFICATE-----

</ca>

<cert>

-----BEGIN CERTIFICATE-----

….

-----END CERTIFICATE-----

</cert>

<key>

-----BEGIN PRIVATE KEY-----

….

-----END PRIVATE KEY-----

</key>

<tls-auth>

-----BEGIN OpenVPN Static key V1-----

….

-----END OpenVPN Static key V1-----

</tls-auth>

 

  0      
  0      
#1
Options
1 Accepted Solution
Re:FR365 OpenVPN Client-Solution
Friday - last edited Yesterday

I got the OpenVPN client working with below .ovpn configuration, I also used OpenVPN server 2.6 and easy-rsa 3 certs as the OpenVPN client on the FR365 doesn't support lastest standards.

This was all a waste of time in the end as I can't route traffic from the VPN interface to the internal LAN, which was the purpose of the VPN.  
 

client
dev tun
proto udp
remote XXX.XXX.XXX.XXX 1194
route 192.168.1.0 255.255.255.0
route 192.168.8.0 255.255.255.0
remote-cert-tls server
tls-auth ta.key 1
cipher AES-128-CBC
auth SHA1
<ca>
-----BEGIN CERTIFICATE-----
----
-----END CERTIFICATE-----
</ca>
<cert>
-----BEGIN CERTIFICATE-----
----
-----END CERTIFICATE-----
</cert>
<key>
-----BEGIN PRIVATE KEY-----
----
-----END PRIVATE KEY-----
</key>
<tls-auth>
-----BEGIN OpenVPN Static key V1-----
----
-----END OpenVPN Static key V1-----
</tls-auth>

 

Recommended Solution
  0  
  0  
#2
Options
2 Reply
Re:FR365 OpenVPN Client-Solution
Friday - last edited Yesterday

I got the OpenVPN client working with below .ovpn configuration, I also used OpenVPN server 2.6 and easy-rsa 3 certs as the OpenVPN client on the FR365 doesn't support lastest standards.

This was all a waste of time in the end as I can't route traffic from the VPN interface to the internal LAN, which was the purpose of the VPN.  
 

client
dev tun
proto udp
remote XXX.XXX.XXX.XXX 1194
route 192.168.1.0 255.255.255.0
route 192.168.8.0 255.255.255.0
remote-cert-tls server
tls-auth ta.key 1
cipher AES-128-CBC
auth SHA1
<ca>
-----BEGIN CERTIFICATE-----
----
-----END CERTIFICATE-----
</ca>
<cert>
-----BEGIN CERTIFICATE-----
----
-----END CERTIFICATE-----
</cert>
<key>
-----BEGIN PRIVATE KEY-----
----
-----END PRIVATE KEY-----
</key>
<tls-auth>
-----BEGIN OpenVPN Static key V1-----
----
-----END OpenVPN Static key V1-----
</tls-auth>

 

Recommended Solution
  0  
  0  
#2
Options
Re:FR365 OpenVPN Client
Yesterday

  @BenPe 

Yes, as you mentioned, routing configuration for OpenVPN is currently not supported.

  0  
  0  
#3
Options