Changes

no edit summary
Line 209: Line 209:     
The configuration should look something like this:
 
The configuration should look something like this:
 +
 +
[[File:Networking rut configuration openvpn push options v1.jpg|alt=|border|class=tlt-border]]
 +
 +
=====Enable Client to Client=====
 +
----
 +
The next and final step is to enable the Client to Client functionality. To do this, go to the OpenVPN server's configuration window and put a checkmark at the '''Client to client''' option:
 +
 +
[[File:Networking rut configuration ovpn client to client v1.jpg|alt=|border|class=tlt-border]]
 +
 +
If you did so and followed all of the previous steps in the section, your OpenVPN Clients should now be able to communicate with each other.
 +
 +
===OpenVPN Proxy===
 +
----
 +
OpenVPN Servers can be used as Proxies by OpenVPN Clients. This means that the client will be assigned the Public IP address of the OpenVPN server and will be seen as using that IP address when browsing the Internet, transferring data or doing any other online activities. This section provides directions on how to set up an OpenVPN Proxy on RUT routers.
 +
 +
====Push options====
 +
----
 +
The first thing that you have to do is configure Push options in the OpenVPN Server configuration that will change the Clients' default WAN route to OpenVPN and set the DNS server to the OpenVPN Server's LAN IP. To do so open the OpenVPN configuration window and add these options to the Push option field:
 +
 +
'''redirect-gateway def1'''
 +
'''dhcp-option DNS 192.168.1.1'''
 +
 +
In this context, 192.168.1.1 is the OpenVPN Server's LAN IP address. Replace this value with your own Server's LAN IP address.
 +
 +
====Firewall Zone Forwarding====
 +
----
 +
Next, go to the '''Network → Firewall → Zone Forwarding section. Click the '''Edit''' button located next to the '''vpn''' rule and in the subsequent window add a checkmark next to '''wan''' as such:'''