Table of Contents
Click an item to jump directly to that question.
1. How can I restrict access to certain OpenVPN users?
Any networks you export in OpenVPN will be available to everyone; if you'd like to allow or deny access to specific resources for specific users you can use Firewall rules.
2. What operating systems are supported?
OpenVPN supports most operating systems.
Refer to this KB article for instructions on importing your client config file into the OpenVPN Client Config app in Windows: https://support.untangle.com/hc/en-us/articles/206259537
For all other operating systems Untangle distributes a .zip with configuration and certificate files - these can be used with any OpenVPN-compatible VPN software on any operating system.
3. Is there a way to set up a password for OpenVPN users?
Yes, this can be configured on the server side and integrated with either Local Directory or Radius. Once enabled the clients will need to be redeployed to leverage the extra authentication.
4. Can I still use OpenVPN if my NG Firewall is in bridge mode?
Yes, however you will probably need to make some changes on your router to set it up properly. Set up OpenVPN as necessary, then on your router:
- Forward port 1194 (UDP) to the NG Firewall.
- Verify your setting is correct at Config > Administration > Public Address as it is used by NG Firewall for configuring OpenVPN clients.
5. OpenVPN connects, but I can't access anything. Why is this?
Many things could cause this issue. First, verify that the hosts you are trying to reach are exported in Exported Networks. After connecting OpenVPN, try to ping NG Firewall's LAN IP address (if exported), then try to bring up the UI by entering the IP in a browser. If these work your tunnel is up and operational.
If you can't reach a Windows machine, verify Windows Firewall is disabled on the target machine as it will block access from non-local subnets by default. If the target machine runs another OS, verify it is either using NG Firewall as a gateway or the machine its using as a gateway has a static route sending the VPN Address Pool to the NG Firewall.
6. Clients are getting disconnected after 60 seconds. Why?
Did you share the same client config between multiple machines? If both are running they will conflict. When the second one connects the first is disconnected. After 60 seconds the first will reconnect and disconnect the second. This repeats endlessly. Do not share the same client config with multiple machines.
7. Can I create site-to-site tunnels with non-Untangle devices?
When using OpenVPN for site-to-site tunnels Untangle only supports using other NG Firewall boxes as endpoints. Some users have had success with DD-WRT and Tomato, but this is not supported by Untangle. If you need to connect a VPN tunnel to a non-Untangle device, we recommend using IPSEC VPN.
8. My site-to-site tunnel is set up correctly, but it isn't working properly. Why?
If you have a site with a WAN IP of 184.108.40.206 and another site with a WAN IP of 220.127.116.11, the site-to-site VPN tunnel may not work if the IPs are in the same subnet or share the same gateway. In order for the site to site VPN to work, each location needs to be completely different from the other location. You might need to ask your ISP to change one of your sites IPs to a different subnet.
9. How can I get DNS resolution working over my site-to-site tunnel?
You'll need to go to Config > Network > DNS Server > Domain DNS Servers and add the IP of the DNS server on the far side of the tunnel, enter the domain in the Domain List column, and use the FQDN when accessing resources. Please note that you'll need to do this on both sides of the tunnel for it to work from either side.
10. How can I allow software clients to resolve DNS over the tunnel?
To allow DNS resolution for software clients you'll need to modify some OpenVPN settings - if Untangle is doing DNS resolution on your network, simply check Push DNS at OpenVPN Settings > Server > Groups for any Groups you want DNS resolution exported for. If NG Firewall is not resolving DNS on your network, you'll need to check Push DNS, set Push DNS Server to "Custom", then enter the IP address of the DNS Server(s) under DNS Custom 1 / 2. You may need to use the FQDN when accessing resources across the tunnel.