Port forwarding with OpenVPNUsing VPN to be accessible from internetOpenvpn - enabled traffic forwarding but want to restrict itRemote access to internal machine (ssh port-forwarding)OpenVPN performance terrible to other machines on server's subnetPort forwarding through OpenVPNopenvpn port forwarding for SNAT or DNAT with Iptables?Port Forwarding through OpenVPN to Client on OpenVZPort Forwarding to OpenVPN connects once then stops connectingPing Reply not forwarding to the originator; RoutingIP forwarding issue on LinuxOpenVPN client with static NATPort forwarding through VPS with OpenVPN to Client

Arriving at the same result with the opposite hypotheses

Difference between > and >> when used with a named pipe

Find the limit of a multiplying term function when n tends to infinity.

Second (easy access) account in case my bank screws up

How to return a security deposit to a tenant

How can I tell the difference between unmarked sugar and stevia?

Logarithm of exponential

Preventing employees from either switching to competitors or opening their own business

Is counterpoint still used today?

Why doesn't Adrian Toomes give up Spider-Man's identity?

Passing multiple files through stdin (over ssh)

Can you see exclusive car models from other platforms when playing cross-platform?

Cycle through MeshStyle directives in ListLinePlot

Impedance ratio vs. SWR

What can I, as a user, do about offensive reviews in App Store?

Why didn't Voldemort recognize that Dumbledore was affected by his curse?

How did old MS-DOS games utilize various graphic cards?

What is wrong with this proof that symmetric matrices commute?

Soft question: Examples where lack of mathematical rigour cause security breaches?

How to handle self harm scars on the arm in work environment?

How can "научись" mean "take it and keep trying"?

This riddle is not to see but to solve

Confusion around using "des" in sentences

Grover algorithm for a database search: where is the quantum advantage?



Port forwarding with OpenVPN


Using VPN to be accessible from internetOpenvpn - enabled traffic forwarding but want to restrict itRemote access to internal machine (ssh port-forwarding)OpenVPN performance terrible to other machines on server's subnetPort forwarding through OpenVPNopenvpn port forwarding for SNAT or DNAT with Iptables?Port Forwarding through OpenVPN to Client on OpenVZPort Forwarding to OpenVPN connects once then stops connectingPing Reply not forwarding to the originator; RoutingIP forwarding issue on LinuxOpenVPN client with static NATPort forwarding through VPS with OpenVPN to Client






.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty,.everyoneloves__bot-mid-leaderboard:empty height:90px;width:728px;box-sizing:border-box;








5















Set up an openvpn server but having trouble getting ports forwarded to the client.



Below is what I am trying to do:



WAN: 123.45.67.89:4444 -> [OpenVPN Server] -> CLIENT: 192.168.1.10:4444



Seen many different answers on how to do this but no matter what I try it doesn't seem to work and port tests always show the port as closed.










share|improve this question




























    5















    Set up an openvpn server but having trouble getting ports forwarded to the client.



    Below is what I am trying to do:



    WAN: 123.45.67.89:4444 -> [OpenVPN Server] -> CLIENT: 192.168.1.10:4444



    Seen many different answers on how to do this but no matter what I try it doesn't seem to work and port tests always show the port as closed.










    share|improve this question
























      5












      5








      5


      1






      Set up an openvpn server but having trouble getting ports forwarded to the client.



      Below is what I am trying to do:



      WAN: 123.45.67.89:4444 -> [OpenVPN Server] -> CLIENT: 192.168.1.10:4444



      Seen many different answers on how to do this but no matter what I try it doesn't seem to work and port tests always show the port as closed.










      share|improve this question














      Set up an openvpn server but having trouble getting ports forwarded to the client.



      Below is what I am trying to do:



      WAN: 123.45.67.89:4444 -> [OpenVPN Server] -> CLIENT: 192.168.1.10:4444



      Seen many different answers on how to do this but no matter what I try it doesn't seem to work and port tests always show the port as closed.







      iptables openvpn nat port-forwarding






      share|improve this question













      share|improve this question











      share|improve this question




      share|improve this question










      asked Feb 23 '17 at 20:46









      Red SpiderRed Spider

      26112




      26112




















          2 Answers
          2






          active

          oldest

          votes


















          2














          I assume you're using OpenVPN in routed mode and are NATting its clients onto the WAN. If so, you'll want to do the following:



          iptables -t nat -A PREROUTING -i eth0 -d 123.45.67.89 -p tcp --dport 4444 -j DNAT --to-destination 192.168.1.10 (change eth0 to whatever interface your WAN is actually on).



          If you're not using NAT, then it's just a matter of making sure the host you're trying to connect from knows to route packets destined for 192.168.1.10 through 123.45.67.89 (which obviously won't work to an RFC1918 IP over the Internet). In any case, the only other requirements are that you have IPv4 routing enabled (I'd assume that the VPN wouldn't be working at all if you didn't) and that you don't have any other firewall rules that would block this traffic.






          share|improve this answer























          • Thanks for the reply. Tried the above but still port tests still show port is closed. Made sure to iptables -A INPUT -p tcp --dport 4444 -j ACCEPT so port should be able on the OpenVPN server.

            – Red Spider
            Feb 24 '17 at 23:12












          • You need to use the FORWARD chain, not the INPUT chain.

            – Joseph Sible
            Feb 25 '17 at 0:28











          • i needed to add -A POSTROUTING -p tcp -d 192.168.1.10 --dport 4444 -j MASQUERADE rule as well

            – ptica
            Sep 26 '17 at 10:41












          • @ptica that rule would only be needed for NAT reflection (and its scope could be made a bit narrower).

            – Joseph Sible
            Sep 27 '17 at 19:43











          • hi @JosephSible, thanks for the remark, i couldn't telnet into 123.45.67.89:4444 without that POSTROUTING rule, however I still do not understand the need for it as I already route 192.168.1.0/24 to openvpn's gateway 10.8.0.2

            – ptica
            Sep 28 '17 at 5:34


















          0














          So this was our solution in iptables. You still need to set ip_forward in linux.



           *nat
          :PREROUTING ACCEPT [56:16971]
          :INPUT ACCEPT [1:52]
          :OUTPUT ACCEPT [31:2256]
          :POSTROUTING ACCEPT [31:2256]
          -A POSTROUTING -s 10.2.0.0/24 -o enp1s0 -j MASQUERADE
          -A PREROUTING -i enp1s0 -p tcp --dport 9000 -j DNAT --to-destination 10.2.0.22
          COMMIT
          *filter
          :INPUT ACCEPT [0:0]
          :FORWARD ACCEPT [0:0]
          :OUTPUT ACCEPT [5618:4419840]
          -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
          -A INPUT -p icmp -j ACCEPT
          -A INPUT -i lo -j ACCEPT
          -A INPUT -p tcp -m state --state NEW -m tcp --dport 22 -j ACCEPT
          -A INPUT -j REJECT --reject-with icmp-host-prohibited
          -A FORWARD -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
          -A FORWARD -s 10.2.0.0/24 -j ACCEPT
          -A FORWARD -i enp1s0 -o tun1 -p tcp --dport 9000 --syn -m conntrack --ctstate NEW -j ACCEPT
          -A FORWARD -i enp1s0 -o tun1 -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT
          -A FORWARD -i tun1 -o enp1s0 -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT

          -A FORWARD -j REJECT --reject-with icmp-host-prohibited
          COMMIT
          # Completed on Wed Dec 20 18:30:08 2017





          share|improve this answer























            Your Answer








            StackExchange.ready(function()
            var channelOptions =
            tags: "".split(" "),
            id: "2"
            ;
            initTagRenderer("".split(" "), "".split(" "), channelOptions);

            StackExchange.using("externalEditor", function()
            // Have to fire editor after snippets, if snippets enabled
            if (StackExchange.settings.snippets.snippetsEnabled)
            StackExchange.using("snippets", function()
            createEditor();
            );

            else
            createEditor();

            );

            function createEditor()
            StackExchange.prepareEditor(
            heartbeatType: 'answer',
            autoActivateHeartbeat: false,
            convertImagesToLinks: true,
            noModals: true,
            showLowRepImageUploadWarning: true,
            reputationToPostImages: 10,
            bindNavPrevention: true,
            postfix: "",
            imageUploader:
            brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
            contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
            allowUrls: true
            ,
            onDemand: true,
            discardSelector: ".discard-answer"
            ,immediatelyShowMarkdownHelp:true
            );



            );













            draft saved

            draft discarded


















            StackExchange.ready(
            function ()
            StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fserverfault.com%2fquestions%2f834566%2fport-forwarding-with-openvpn%23new-answer', 'question_page');

            );

            Post as a guest















            Required, but never shown

























            2 Answers
            2






            active

            oldest

            votes








            2 Answers
            2






            active

            oldest

            votes









            active

            oldest

            votes






            active

            oldest

            votes









            2














            I assume you're using OpenVPN in routed mode and are NATting its clients onto the WAN. If so, you'll want to do the following:



            iptables -t nat -A PREROUTING -i eth0 -d 123.45.67.89 -p tcp --dport 4444 -j DNAT --to-destination 192.168.1.10 (change eth0 to whatever interface your WAN is actually on).



            If you're not using NAT, then it's just a matter of making sure the host you're trying to connect from knows to route packets destined for 192.168.1.10 through 123.45.67.89 (which obviously won't work to an RFC1918 IP over the Internet). In any case, the only other requirements are that you have IPv4 routing enabled (I'd assume that the VPN wouldn't be working at all if you didn't) and that you don't have any other firewall rules that would block this traffic.






            share|improve this answer























            • Thanks for the reply. Tried the above but still port tests still show port is closed. Made sure to iptables -A INPUT -p tcp --dport 4444 -j ACCEPT so port should be able on the OpenVPN server.

              – Red Spider
              Feb 24 '17 at 23:12












            • You need to use the FORWARD chain, not the INPUT chain.

              – Joseph Sible
              Feb 25 '17 at 0:28











            • i needed to add -A POSTROUTING -p tcp -d 192.168.1.10 --dport 4444 -j MASQUERADE rule as well

              – ptica
              Sep 26 '17 at 10:41












            • @ptica that rule would only be needed for NAT reflection (and its scope could be made a bit narrower).

              – Joseph Sible
              Sep 27 '17 at 19:43











            • hi @JosephSible, thanks for the remark, i couldn't telnet into 123.45.67.89:4444 without that POSTROUTING rule, however I still do not understand the need for it as I already route 192.168.1.0/24 to openvpn's gateway 10.8.0.2

              – ptica
              Sep 28 '17 at 5:34















            2














            I assume you're using OpenVPN in routed mode and are NATting its clients onto the WAN. If so, you'll want to do the following:



            iptables -t nat -A PREROUTING -i eth0 -d 123.45.67.89 -p tcp --dport 4444 -j DNAT --to-destination 192.168.1.10 (change eth0 to whatever interface your WAN is actually on).



            If you're not using NAT, then it's just a matter of making sure the host you're trying to connect from knows to route packets destined for 192.168.1.10 through 123.45.67.89 (which obviously won't work to an RFC1918 IP over the Internet). In any case, the only other requirements are that you have IPv4 routing enabled (I'd assume that the VPN wouldn't be working at all if you didn't) and that you don't have any other firewall rules that would block this traffic.






            share|improve this answer























            • Thanks for the reply. Tried the above but still port tests still show port is closed. Made sure to iptables -A INPUT -p tcp --dport 4444 -j ACCEPT so port should be able on the OpenVPN server.

              – Red Spider
              Feb 24 '17 at 23:12












            • You need to use the FORWARD chain, not the INPUT chain.

              – Joseph Sible
              Feb 25 '17 at 0:28











            • i needed to add -A POSTROUTING -p tcp -d 192.168.1.10 --dport 4444 -j MASQUERADE rule as well

              – ptica
              Sep 26 '17 at 10:41












            • @ptica that rule would only be needed for NAT reflection (and its scope could be made a bit narrower).

              – Joseph Sible
              Sep 27 '17 at 19:43











            • hi @JosephSible, thanks for the remark, i couldn't telnet into 123.45.67.89:4444 without that POSTROUTING rule, however I still do not understand the need for it as I already route 192.168.1.0/24 to openvpn's gateway 10.8.0.2

              – ptica
              Sep 28 '17 at 5:34













            2












            2








            2







            I assume you're using OpenVPN in routed mode and are NATting its clients onto the WAN. If so, you'll want to do the following:



            iptables -t nat -A PREROUTING -i eth0 -d 123.45.67.89 -p tcp --dport 4444 -j DNAT --to-destination 192.168.1.10 (change eth0 to whatever interface your WAN is actually on).



            If you're not using NAT, then it's just a matter of making sure the host you're trying to connect from knows to route packets destined for 192.168.1.10 through 123.45.67.89 (which obviously won't work to an RFC1918 IP over the Internet). In any case, the only other requirements are that you have IPv4 routing enabled (I'd assume that the VPN wouldn't be working at all if you didn't) and that you don't have any other firewall rules that would block this traffic.






            share|improve this answer













            I assume you're using OpenVPN in routed mode and are NATting its clients onto the WAN. If so, you'll want to do the following:



            iptables -t nat -A PREROUTING -i eth0 -d 123.45.67.89 -p tcp --dport 4444 -j DNAT --to-destination 192.168.1.10 (change eth0 to whatever interface your WAN is actually on).



            If you're not using NAT, then it's just a matter of making sure the host you're trying to connect from knows to route packets destined for 192.168.1.10 through 123.45.67.89 (which obviously won't work to an RFC1918 IP over the Internet). In any case, the only other requirements are that you have IPv4 routing enabled (I'd assume that the VPN wouldn't be working at all if you didn't) and that you don't have any other firewall rules that would block this traffic.







            share|improve this answer












            share|improve this answer



            share|improve this answer










            answered Feb 23 '17 at 21:44









            Joseph SibleJoseph Sible

            21015




            21015












            • Thanks for the reply. Tried the above but still port tests still show port is closed. Made sure to iptables -A INPUT -p tcp --dport 4444 -j ACCEPT so port should be able on the OpenVPN server.

              – Red Spider
              Feb 24 '17 at 23:12












            • You need to use the FORWARD chain, not the INPUT chain.

              – Joseph Sible
              Feb 25 '17 at 0:28











            • i needed to add -A POSTROUTING -p tcp -d 192.168.1.10 --dport 4444 -j MASQUERADE rule as well

              – ptica
              Sep 26 '17 at 10:41












            • @ptica that rule would only be needed for NAT reflection (and its scope could be made a bit narrower).

              – Joseph Sible
              Sep 27 '17 at 19:43











            • hi @JosephSible, thanks for the remark, i couldn't telnet into 123.45.67.89:4444 without that POSTROUTING rule, however I still do not understand the need for it as I already route 192.168.1.0/24 to openvpn's gateway 10.8.0.2

              – ptica
              Sep 28 '17 at 5:34

















            • Thanks for the reply. Tried the above but still port tests still show port is closed. Made sure to iptables -A INPUT -p tcp --dport 4444 -j ACCEPT so port should be able on the OpenVPN server.

              – Red Spider
              Feb 24 '17 at 23:12












            • You need to use the FORWARD chain, not the INPUT chain.

              – Joseph Sible
              Feb 25 '17 at 0:28











            • i needed to add -A POSTROUTING -p tcp -d 192.168.1.10 --dport 4444 -j MASQUERADE rule as well

              – ptica
              Sep 26 '17 at 10:41












            • @ptica that rule would only be needed for NAT reflection (and its scope could be made a bit narrower).

              – Joseph Sible
              Sep 27 '17 at 19:43











            • hi @JosephSible, thanks for the remark, i couldn't telnet into 123.45.67.89:4444 without that POSTROUTING rule, however I still do not understand the need for it as I already route 192.168.1.0/24 to openvpn's gateway 10.8.0.2

              – ptica
              Sep 28 '17 at 5:34
















            Thanks for the reply. Tried the above but still port tests still show port is closed. Made sure to iptables -A INPUT -p tcp --dport 4444 -j ACCEPT so port should be able on the OpenVPN server.

            – Red Spider
            Feb 24 '17 at 23:12






            Thanks for the reply. Tried the above but still port tests still show port is closed. Made sure to iptables -A INPUT -p tcp --dport 4444 -j ACCEPT so port should be able on the OpenVPN server.

            – Red Spider
            Feb 24 '17 at 23:12














            You need to use the FORWARD chain, not the INPUT chain.

            – Joseph Sible
            Feb 25 '17 at 0:28





            You need to use the FORWARD chain, not the INPUT chain.

            – Joseph Sible
            Feb 25 '17 at 0:28













            i needed to add -A POSTROUTING -p tcp -d 192.168.1.10 --dport 4444 -j MASQUERADE rule as well

            – ptica
            Sep 26 '17 at 10:41






            i needed to add -A POSTROUTING -p tcp -d 192.168.1.10 --dport 4444 -j MASQUERADE rule as well

            – ptica
            Sep 26 '17 at 10:41














            @ptica that rule would only be needed for NAT reflection (and its scope could be made a bit narrower).

            – Joseph Sible
            Sep 27 '17 at 19:43





            @ptica that rule would only be needed for NAT reflection (and its scope could be made a bit narrower).

            – Joseph Sible
            Sep 27 '17 at 19:43













            hi @JosephSible, thanks for the remark, i couldn't telnet into 123.45.67.89:4444 without that POSTROUTING rule, however I still do not understand the need for it as I already route 192.168.1.0/24 to openvpn's gateway 10.8.0.2

            – ptica
            Sep 28 '17 at 5:34





            hi @JosephSible, thanks for the remark, i couldn't telnet into 123.45.67.89:4444 without that POSTROUTING rule, however I still do not understand the need for it as I already route 192.168.1.0/24 to openvpn's gateway 10.8.0.2

            – ptica
            Sep 28 '17 at 5:34













            0














            So this was our solution in iptables. You still need to set ip_forward in linux.



             *nat
            :PREROUTING ACCEPT [56:16971]
            :INPUT ACCEPT [1:52]
            :OUTPUT ACCEPT [31:2256]
            :POSTROUTING ACCEPT [31:2256]
            -A POSTROUTING -s 10.2.0.0/24 -o enp1s0 -j MASQUERADE
            -A PREROUTING -i enp1s0 -p tcp --dport 9000 -j DNAT --to-destination 10.2.0.22
            COMMIT
            *filter
            :INPUT ACCEPT [0:0]
            :FORWARD ACCEPT [0:0]
            :OUTPUT ACCEPT [5618:4419840]
            -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
            -A INPUT -p icmp -j ACCEPT
            -A INPUT -i lo -j ACCEPT
            -A INPUT -p tcp -m state --state NEW -m tcp --dport 22 -j ACCEPT
            -A INPUT -j REJECT --reject-with icmp-host-prohibited
            -A FORWARD -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
            -A FORWARD -s 10.2.0.0/24 -j ACCEPT
            -A FORWARD -i enp1s0 -o tun1 -p tcp --dport 9000 --syn -m conntrack --ctstate NEW -j ACCEPT
            -A FORWARD -i enp1s0 -o tun1 -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT
            -A FORWARD -i tun1 -o enp1s0 -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT

            -A FORWARD -j REJECT --reject-with icmp-host-prohibited
            COMMIT
            # Completed on Wed Dec 20 18:30:08 2017





            share|improve this answer



























              0














              So this was our solution in iptables. You still need to set ip_forward in linux.



               *nat
              :PREROUTING ACCEPT [56:16971]
              :INPUT ACCEPT [1:52]
              :OUTPUT ACCEPT [31:2256]
              :POSTROUTING ACCEPT [31:2256]
              -A POSTROUTING -s 10.2.0.0/24 -o enp1s0 -j MASQUERADE
              -A PREROUTING -i enp1s0 -p tcp --dport 9000 -j DNAT --to-destination 10.2.0.22
              COMMIT
              *filter
              :INPUT ACCEPT [0:0]
              :FORWARD ACCEPT [0:0]
              :OUTPUT ACCEPT [5618:4419840]
              -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
              -A INPUT -p icmp -j ACCEPT
              -A INPUT -i lo -j ACCEPT
              -A INPUT -p tcp -m state --state NEW -m tcp --dport 22 -j ACCEPT
              -A INPUT -j REJECT --reject-with icmp-host-prohibited
              -A FORWARD -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
              -A FORWARD -s 10.2.0.0/24 -j ACCEPT
              -A FORWARD -i enp1s0 -o tun1 -p tcp --dport 9000 --syn -m conntrack --ctstate NEW -j ACCEPT
              -A FORWARD -i enp1s0 -o tun1 -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT
              -A FORWARD -i tun1 -o enp1s0 -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT

              -A FORWARD -j REJECT --reject-with icmp-host-prohibited
              COMMIT
              # Completed on Wed Dec 20 18:30:08 2017





              share|improve this answer

























                0












                0








                0







                So this was our solution in iptables. You still need to set ip_forward in linux.



                 *nat
                :PREROUTING ACCEPT [56:16971]
                :INPUT ACCEPT [1:52]
                :OUTPUT ACCEPT [31:2256]
                :POSTROUTING ACCEPT [31:2256]
                -A POSTROUTING -s 10.2.0.0/24 -o enp1s0 -j MASQUERADE
                -A PREROUTING -i enp1s0 -p tcp --dport 9000 -j DNAT --to-destination 10.2.0.22
                COMMIT
                *filter
                :INPUT ACCEPT [0:0]
                :FORWARD ACCEPT [0:0]
                :OUTPUT ACCEPT [5618:4419840]
                -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
                -A INPUT -p icmp -j ACCEPT
                -A INPUT -i lo -j ACCEPT
                -A INPUT -p tcp -m state --state NEW -m tcp --dport 22 -j ACCEPT
                -A INPUT -j REJECT --reject-with icmp-host-prohibited
                -A FORWARD -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
                -A FORWARD -s 10.2.0.0/24 -j ACCEPT
                -A FORWARD -i enp1s0 -o tun1 -p tcp --dport 9000 --syn -m conntrack --ctstate NEW -j ACCEPT
                -A FORWARD -i enp1s0 -o tun1 -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT
                -A FORWARD -i tun1 -o enp1s0 -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT

                -A FORWARD -j REJECT --reject-with icmp-host-prohibited
                COMMIT
                # Completed on Wed Dec 20 18:30:08 2017





                share|improve this answer













                So this was our solution in iptables. You still need to set ip_forward in linux.



                 *nat
                :PREROUTING ACCEPT [56:16971]
                :INPUT ACCEPT [1:52]
                :OUTPUT ACCEPT [31:2256]
                :POSTROUTING ACCEPT [31:2256]
                -A POSTROUTING -s 10.2.0.0/24 -o enp1s0 -j MASQUERADE
                -A PREROUTING -i enp1s0 -p tcp --dport 9000 -j DNAT --to-destination 10.2.0.22
                COMMIT
                *filter
                :INPUT ACCEPT [0:0]
                :FORWARD ACCEPT [0:0]
                :OUTPUT ACCEPT [5618:4419840]
                -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
                -A INPUT -p icmp -j ACCEPT
                -A INPUT -i lo -j ACCEPT
                -A INPUT -p tcp -m state --state NEW -m tcp --dport 22 -j ACCEPT
                -A INPUT -j REJECT --reject-with icmp-host-prohibited
                -A FORWARD -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
                -A FORWARD -s 10.2.0.0/24 -j ACCEPT
                -A FORWARD -i enp1s0 -o tun1 -p tcp --dport 9000 --syn -m conntrack --ctstate NEW -j ACCEPT
                -A FORWARD -i enp1s0 -o tun1 -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT
                -A FORWARD -i tun1 -o enp1s0 -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT

                -A FORWARD -j REJECT --reject-with icmp-host-prohibited
                COMMIT
                # Completed on Wed Dec 20 18:30:08 2017






                share|improve this answer












                share|improve this answer



                share|improve this answer










                answered May 5 '18 at 21:27









                Kevin ParkerKevin Parker

                1233




                1233



























                    draft saved

                    draft discarded
















































                    Thanks for contributing an answer to Server Fault!


                    • Please be sure to answer the question. Provide details and share your research!

                    But avoid


                    • Asking for help, clarification, or responding to other answers.

                    • Making statements based on opinion; back them up with references or personal experience.

                    To learn more, see our tips on writing great answers.




                    draft saved


                    draft discarded














                    StackExchange.ready(
                    function ()
                    StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fserverfault.com%2fquestions%2f834566%2fport-forwarding-with-openvpn%23new-answer', 'question_page');

                    );

                    Post as a guest















                    Required, but never shown





















































                    Required, but never shown














                    Required, but never shown












                    Required, but never shown







                    Required, but never shown

































                    Required, but never shown














                    Required, but never shown












                    Required, but never shown







                    Required, but never shown







                    Popular posts from this blog

                    Club Baloncesto Breogán Índice Historia | Pavillón | Nome | O Breogán na cultura popular | Xogadores | Adestradores | Presidentes | Palmarés | Historial | Líderes | Notas | Véxase tamén | Menú de navegacióncbbreogan.galCadroGuía oficial da ACB 2009-10, páxina 201Guía oficial ACB 1992, páxina 183. Editorial DB.É de 6.500 espectadores sentados axeitándose á última normativa"Estudiantes Junior, entre as mellores canteiras"o orixinalHemeroteca El Mundo Deportivo, 16 setembro de 1970, páxina 12Historia do BreogánAlfredo Pérez, o último canoneiroHistoria C.B. BreogánHemeroteca de El Mundo DeportivoJimmy Wright, norteamericano do Breogán deixará Lugo por ameazas de morteResultados de Breogán en 1986-87Resultados de Breogán en 1990-91Ficha de Velimir Perasović en acb.comResultados de Breogán en 1994-95Breogán arrasa al Barça. "El Mundo Deportivo", 27 de setembro de 1999, páxina 58CB Breogán - FC BarcelonaA FEB invita a participar nunha nova Liga EuropeaCharlie Bell na prensa estatalMáximos anotadores 2005Tempada 2005-06 : Tódolos Xogadores da Xornada""Non quero pensar nunha man negra, mais pregúntome que está a pasar""o orixinalRaúl López, orgulloso dos xogadores, presume da boa saúde económica do BreogánJulio González confirma que cesa como presidente del BreogánHomenaxe a Lisardo GómezA tempada do rexurdimento celesteEntrevista a Lisardo GómezEl COB dinamita el Pazo para forzar el quinto (69-73)Cafés Candelas, patrocinador del CB Breogán"Suso Lázare, novo presidente do Breogán"o orixinalCafés Candelas Breogán firma el mayor triunfo de la historiaEl Breogán realizará 17 homenajes por su cincuenta aniversario"O Breogán honra ao seu fundador e primeiro presidente"o orixinalMiguel Giao recibiu a homenaxe do PazoHomenaxe aos primeiros gladiadores celestesO home que nos amosa como ver o Breo co corazónTita Franco será homenaxeada polos #50anosdeBreoJulio Vila recibirá unha homenaxe in memoriam polos #50anosdeBreo"O Breogán homenaxeará aos seus aboados máis veteráns"Pechada ovación a «Capi» Sanmartín e Ricardo «Corazón de González»Homenaxe por décadas de informaciónPaco García volve ao Pazo con motivo do 50 aniversario"Resultados y clasificaciones""O Cafés Candelas Breogán, campión da Copa Princesa""O Cafés Candelas Breogán, equipo ACB"C.B. Breogán"Proxecto social"o orixinal"Centros asociados"o orixinalFicha en imdb.comMario Camus trata la recuperación del amor en 'La vieja música', su última película"Páxina web oficial""Club Baloncesto Breogán""C. B. Breogán S.A.D."eehttp://www.fegaba.com

                    Vilaño, A Laracha Índice Patrimonio | Lugares e parroquias | Véxase tamén | Menú de navegación43°14′52″N 8°36′03″O / 43.24775, -8.60070

                    Cegueira Índice Epidemioloxía | Deficiencia visual | Tipos de cegueira | Principais causas de cegueira | Tratamento | Técnicas de adaptación e axudas | Vida dos cegos | Primeiros auxilios | Crenzas respecto das persoas cegas | Crenzas das persoas cegas | O neno deficiente visual | Aspectos psicolóxicos da cegueira | Notas | Véxase tamén | Menú de navegación54.054.154.436928256blindnessDicionario da Real Academia GalegaPortal das Palabras"International Standards: Visual Standards — Aspects and Ranges of Vision Loss with Emphasis on Population Surveys.""Visual impairment and blindness""Presentan un plan para previr a cegueira"o orixinalACCDV Associació Catalana de Cecs i Disminuïts Visuals - PMFTrachoma"Effect of gene therapy on visual function in Leber's congenital amaurosis"1844137110.1056/NEJMoa0802268Cans guía - os mellores amigos dos cegosArquivadoEscola de cans guía para cegos en Mortágua, PortugalArquivado"Tecnología para ciegos y deficientes visuales. Recopilación de recursos gratuitos en la Red""Colorino""‘COL.diesis’, escuchar los sonidos del color""COL.diesis: Transforming Colour into Melody and Implementing the Result in a Colour Sensor Device"o orixinal"Sistema de desarrollo de sinestesia color-sonido para invidentes utilizando un protocolo de audio""Enseñanza táctil - geometría y color. Juegos didácticos para niños ciegos y videntes""Sistema Constanz"L'ocupació laboral dels cecs a l'Estat espanyol està pràcticament equiparada a la de les persones amb visió, entrevista amb Pedro ZuritaONCE (Organización Nacional de Cegos de España)Prevención da cegueiraDescrición de deficiencias visuais (Disc@pnet)Braillín, un boneco atractivo para calquera neno, con ou sen discapacidade, que permite familiarizarse co sistema de escritura e lectura brailleAxudas Técnicas36838ID00897494007150-90057129528256DOID:1432HP:0000618D001766C10.597.751.941.162C97109C0155020