Table of Contents
Click an item to jump directly to that question.
- How Can I Restrict Access To Certain OpenVPN Users?
- What Operating Systems Are Supported?
- Is There A Way To Setup A Password For The OpenVPN Users?
- Can I Still Use OpenVPN If My NG Firewall Is In Bridge Mode?
- OpenVPN Connects, However I Can Not Access Anything. Why Is This?
- Clients Are Getting Disconnected After 60 Seconds. Why?
- Can I Create Site-To-Site Tunnels With Non-Untangle Devices?
- My Site-To-Site Tunnel Is Set Up Correctly, However It Isn't Working Properly Why?
- How Can I Get DNS Resolution Working Over My Site-To-Site Tunnel?
- How Can I Allow Software Clients To Resolve DNS Over The Tunnel?
Any networks you export in OpenVPN will be available to everyone; if you'd like to allow or deny access to specific resources for specific users you can use Firewall rules.
OpenVPN supports most operating systems.
The OpenVPN client that Untangle distributes is compatible with all versions of Windows. However, if you're using any version of Windows newer than XP, you'll need to both install and run the application as an Administrator - simply right-click and choose Run as Administrator. Running as an administrator is necessary to allow the application to write routes for the VPN and must be done every time the application is started.
For Macs, we suggest tunnelblick.
- Download and install the client for Mac OSX
- Log in to the Untangle Server, download the client config zip file and extract all of the files.
- Place it in the ~/Library/Application Support/Tunnelblick/Configurations folder on the Mac.
- Run Tunnelblick by double-clicking its icon in the Applications folder.
For all other operating systems Untangle distributes a .zip with configuration and certificate files - these can be used with any OpenVPN-compatible VPN software on any operating system.
Yes, if you right-click on the OpenVPN icon on the client's PC there is an option for a password - please note this password is only used when launching the client.
Yes, however you will probably need to make some changes on your router to set it up properly. Set up OpenVPN as necessary, then on your router:
- Forward port 1194 (UDP) to the NG Firewall.
- Verify your setting is correct at Config > Administration > Public Address as it is used by NG Firewall for configuring OpenVPN clients.
Many things could cause this issue. First, verify that the hosts you are trying to reach are exported in Exported Networks. After connecting OpenVPN, try to ping NG Firewall's LAN IP address (if exported), then try to bring up the UI by entering the IP in a browser. If these work your tunnel is up and operational.
If you can't reach a Windows machine, verify Windows Firewall is disabled on the target machine as it will block access from non-local subnets by default. If the target machine runs another OS, verify it is either using NG Firewall as a gateway or the machine its using as a gateway has a static route sending the VPN Address Pool to the NG Firewall.
Did you share the same client config between multiple machines? If both are running they will conflict. When the second one connects the first is disconnected. After 60 seconds the first will reconnect and disconnect the second. This repeats endlessly. Do not share the same client config with multiple machines.
When using OpenVPN for site-to-site tunnels Untangle only supports using other NG Firewall boxes as endpoints. Some users have had success with DD-WRT and Tomato, but this is not supported by Untangle. If you need to connect a VPN tunnel to a non-Untangle device, we recommend using IPSEC VPN.
If you have a site with a WAN IP of 220.127.116.11 and another site with a WAN IP of 18.104.22.168, the site-to-site VPN tunnel may not work if the IPs are in the same subnet or share the same gateway. In order for the site to site VPN to work, each location needs to be completely different from the other location. You might need to ask your ISP to change one of your sites IPs to a different subnet.
You'll need to go to Config > Network > DNS Server > Domain DNS Servers and add the IP of the DNS server on the far side of the tunnel, enter the domain in the Domain List column, and use the FQDN when accessing resources. Please note that you'll need to do this on both sides of the tunnel for it to work from either side.
To allow DNS resolution for software clients you'll need to modify some OpenVPN settings - if Untangle is doing DNS resolution on your network, simply check Push DNS at OpenVPN Settings > Server > Groups for any Groups you want DNS resolution exported for. If NG Firewall is not resolving DNS on your network, you'll need to check Push DNS, set Push DNS Server to "Custom", then enter the IP address of the DNS Server(s) under DNS Custom 1 / 2. You may need to use the FQDN when accessing resources across the tunnel.