JW0914 wrote:When you have a chance, could you read through the VPN Wiki and let me know if you think anything else should be
added or clarified? Thanks =]
Awesome =] Glad you got everything figured out 
I will re-flash my router this weekend and re-do everything from scratch...just to make sure it's complete. One nice thing would be to add directly after the wiki how-to route all traffic through VPN. I am struggling with that right now...many different solution approaches out there...many don't work for me...
The solution for my SMB-accessing problem was rather embarrassing. Before I had some firewall rules on my Synology to only accept connections from 192.168.1.0/24 to 192.168.4.0/24. Now with OpenVPN I get 10.1.1.0/24...so...yes...that stupid...
The odd thing was, that I was able to access my NAS through the phone's browser or Synology's own apps, while connected through VPN, but not by using "ES file browser" or "Total Commander". Currently, I don't trust my setup, but then again, too many changes in an uncontrolled manner. Hence, I am redoing everything. :-)
Update & Feedback
@JW0914: First of all a big THANK YOU! for your great work and kind & patient support!!
I spent a couple of hours yesterday because in my attempt to get my router back into a clean state, I bricked it and needed some time to get it back working again. Flashing Linksys' stock firmware did not work for me at all, but I am pretty sure it's a handling issue on my end...
Anyways, I followed your tutorial. In short: It works for me with a minor modification.
In my Android openvpn.ovpn file I had to remove
<tls-auth>
-----BEGIN OpenVPN Static key V1-----
-----END OpenVPN Static key V1-----
</tls-auth>
and replace it with
No other change was needed (neither certificates nor "option tls_server '1'").
Personally, I would appreciate a little more detail in the section Create SSL Certificates. It is also somewhat misleading as the tutorial states
It is highly recommended to add a complex password to your Certificate Authority (CA)
Failure to set any password allows anyone who gains access to your Certificate Authority the ability to create client certificates.
but when I did a
I couldn't set a password. Only for the others, where partly it is indicated to not set one.
This section is confusing to me and I am a bit unsure whether my certificates are now created the "proper" way or not.
Other than that the tutorial is just awesome and makes the process to setup a VPN-server so much easier. The only thing left for me is to get all traffic routed through the OpenVPN server...
(Last edited by gaga on 14 Jul 2015, 11:03)