Book Image

Troubleshooting OpenVPN

By : Eric F Crist
Book Image

Troubleshooting OpenVPN

By: Eric F Crist

Overview of this book

OpenVPN, the most widely used open source VPN package, allows you to create a secure network across systems, keeping your private data secure. Connectivity and other issues are a pain to deal with, especially if they are impacting your business. This book will help you resolve the issues faced by OpenVPN users and teach the techniques on how to troubleshoot it like a true expert. This book is a one stop solution for troubleshooting any issue related to OpenVPN. We will start by introducing you to troubleshooting techniques such as Packet Sniffing, Log Parsing, and OpenSSL. You will see how to overcome operating system specific errors. Later on, you will get to know about network and routing errors by exploring the concepts of IPv4 and IPv6 networking issues. You will discover how to overcome these issues to improve the performance of your OpenVPN deployment. By the end of the book, you will know the best practices, tips, and tricks to ensure the smooth running of your OpenVPN.
Table of Contents (16 chapters)

Inspection and filtering


Whether you are operating a server as a corporate tool or setting up a system to escape a hostile environment, there may be network policies in place that may prevent the successful operation of an OpenVPN connection. If you are a user on a large corporate or government network, it may be against usage policy to create a VPN tunnel and technology may be deployed to actively thwart such a tunnel.

Both corporate network administrators and many governments around the world are doing something named Deep Packet Inspection (DPI). A traditional firewall will only look at what the protocol and port traffic is using and allow or deny the traffic. This method will not prevent someone from moving a service that is blocked to an allowed port to circumvent the firewall.

A firewall or border gateway enabled with DPI is able to look beyond just the protocol and port and actually look at what the traffic is. In some cases, this can be to ensure TLS traffic is actually taking place...