Hello. Assuming you trust the VPN interface you could try moving the tun interface into the “internal” zone in the firewall config. You may have to create a custom string to match the tun0 device and then associate that string with “internal”, and also make sure firewall is not configured to protect the internal zone. (the default).
I’ve used OpenVPN extensively for years, with SAMBA and just about anything else you can imagine, so come back if you have questions and I’m sure I can help you work it out.
I’d like to point out that I’ve done this: HOWTO
Turning off SuseFirewall I can perfectly access shares over internet, so I’ll dig into my iptables rules, and let you know in case anyone has the same problem.
However if you find a useful set of iptables rules that help, I appreciate you can advice me.
Dear llcts1, thanks!
I will try what you suggested first and if no success move on to iptables.
I did not find how to do it so far with YaST, and does not like edit sysconfig/susefirewall by hand as it is overwritten by the former.
Also I’m unable to unprotect the server from the internal zone as it’s being accessed locally by regular users.
In yast firewall config, look for allowed services and add “Samba client” from the preconfigured list of options. This should allow the appropriate samba ports through the firewall which is dropping your packets. Be aware that you are enabling this for a “zone”, not just for a particular interface. You can configure samba to only bind to the tun0 interface (and whatever other interfaces you want it to bind to) which would effectively protect it even if it and other interfaces were in an opened zone.
Hope that’s helpful, let me know. Personaly, I find the SUSE firewall harder to work with than just setting up the iptables rules myself but I was telling you the “suse way” since your log message indicates a SUSE firewall descriptor. If you’re willing and capable of doing iptables yourself then, yeah, let’s do it. That’d be about as easy as adding “iptables -I INPUT -i tun0 -j ACCEPT”
You gave two simple solutions to solve my problem, and I’m happy and thankful to tell you that it worked fine
I’ve already set Samba as an allowed service for Internal Zone, so what did the trick was just add tun0 to internal zone (for others: Interfaces section, click on Custom button and write tun0 or whatever your tunnel device is named in the Internal Zone field).