Eu verifiquei seus registros e não encontrei nenhum problema. Mas você disse que há No firewall on the server
. Isso pode causar problemas, porque você deve habilitar o encaminhamento para o funcionamento do NAT. Aqui está a saída do guia .
ufw
In order to configure your ufw settings for VPN traffic first add the
following to /etc/default/ufw:
DEFAULT_FORWARD_POLICY="ACCEPT"
Now change /etc/ufw/before.rules, and add the following code after the
header and before the "*filter" line. Do not forget to change the
IP/subnet mask to match the one in /etc/openvpn/server/server.conf.
The adapter ID in the example is generically called eth0 so edit it
for your system accordingly.
/etc/ufw/before.rules
# NAT (Network Address Translation) table rules
*nat
:POSTROUTING ACCEPT [0:0]
# Allow traffic from clients to eth0
-A POSTROUTING -s 10.8.0.0/24 -o eth0 -j MASQUERADE
# do not delete the "COMMIT" line or the NAT table rules above will not be processed
COMMIT
Open OpenVPN port 1194:
# ufw allow 1194
Lastly, reload UFW:
# ufw reload
iptables
In order to allow VPN traffic through your iptables firewall of your
server, first create an iptables rule for NAT forwarding [3] on the
server, assuming the interface you want to forward to is named eth0:
iptables -t nat -A POSTROUTING -s 10.8.0.0/24 -o eth0 -j MASQUERADE
E não se esqueça de ativar o encaminhamento em sysctl
sysctl -w net.ipv4.ip_forward=1