Stalinium 52 Posted ... The port-forwarding page was updated very recently (neat!) and there's now an option to test whether the port is open and reachable. I did test it: unreachable!Darn, I must've changed/enabled the firewall again. Disable it? No, I will show you the proper way how to configure Windows Firewall for port-forwarding. Screenshots attached below Go to "Control Panel\All Control Panel Items\Windows Firewall". You will see the Home/Work and Public networks. Find out which one is your OpenVPN connection to AirVPN (mine is properly named, yours will not be), preferably you should've set it as a public network like me. if the VPN connection is not classified as a public network, change it now. There's no reason to allow Windows to be promiscuous with the local services like printing and file sharing on the VPN network. Read what is says about incoming connections: "Block all connections to programs that are not on the list of allowed programs". We will need to change that On the left click "Advanced settings" (opens "Windows Firewall with Advanced Security") - OR skip steps 1,2: Press Win+R keys and run "WF.msc" You'll see the same thing as in 3: "Public profile is Active - Inbound connections that do not match a rule are blocked" and "Outbound connections that do not match a rule are allowed" This means we only need to create inbound rules to allow incoming connections (port-forwarding) [Allow Program] Go to "Inbound Rules" -> New Rule... Rule Type = Program, Next This program path = choose the program's .exe file. Like "C:\Gameserver\server.exe", NEXT For Minecraft that's either java.exe or javaw.exe in Program Files. Windows: cmd.exe and run "where java" to find out the path. The first line is your answer Action = Allow the connection, Next Profile = Check the profile where AirVPN adapter is (e.g. Public). You can select all three checkboxes, it's ok. Name = "MyServer (allow program)" Your new entry will appear at the top. When you next visit the settings, it will be sorted alphabetically. [Allow ports] Only doing (5) was not enough to get port-forwarding to work, I had to explicitly allow the ports. Go to "Inbound Rules" -> New Rule... Rule Type = Port, Next TCP/UDP (repeat these steps to enable TCP AND UDP with 2 different rules) Specific local ports: Enter the port from port-forwarding page. If you specified a different local port there, enter the local port in Firewall settings. Next Allow the connection, Next Profile = See above or check all Name = "MyServer (allow TCP _port#_) Repeat these steps to allow UDP Now port-forwarding should work and inbound connections be accepted by your server or content-sharing application. This guide was sponsored by windows 7 gang Final result (I forgot to allow UDP 1234 too) Go to Windows Firewall, click advanced settings (left): Create new Inbound rule to Allow program (step 5): Now the individual TCP/UDP ports (step 6) Quote Share this post Link to post
NaDre 157 Posted ... Windows will consider the OpenVPN network interface to be a "public" network. But this is not checked by default in the prompt you get when you first start a program that does networking. So a shorter and good enough way might be to: 1. Stop the torrent client. 2. Delete any firewall rules for the torrent client program. No great understanding needed for this. To start Windows Firewall you can find it the start menu, enter "WF.msc" in a command window or: right mouse-click the Windows "Start" button select "Run" enter "WF.msc" In "Inbound Rules" sort by "Program". Find your client, right-mouse click and "Delete". There is probably one entry for TCP and one for UDP. 3. Restart the torrent client. 4. When you get the prompt from Windows Firewall about whether to allow incoming connections, be sure to choose "public" in addition to "private". This will create new firewall rules for the torrent client program. EDIT: Another post about this here:https://airvpn.org/forums/topic/47259-qbittorrent-not-seeding/?tab=comments#comment-111500 1 Stalinium reacted to this Quote Share this post Link to post
Stalinium 52 Posted ... 17 hours ago, Stalinium said: [Allow ports] Only doing (5) was not enough to get port-forwarding to work, I had to explicitly allow the ports. Go to "Inbound Rules" -> New Rule... @NaDre I've already had the program allowed for Private and Public networks and it was not enough. I actually had to manually add the TCP+UDP ports as shown in the guide. Thank you for wf.msc Quote Share this post Link to post
OpenSourcerer 1450 Posted ... I'll tell you how to fix that. The shortest way is in Powershell: > Set-NetFirewallProfile -Profile Domain, Private, Public -Enabled false and doing something with more sense in your life because ultimately your router (AirVPN if connected) is your firewall. 1 Stalinium reacted to this Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
NaDre 157 Posted ... 56 minutes ago, OpenSourcerer said: I'll tell you how to fix that. The shortest way is in Powershell: > Set-NetFirewallProfile -Profile Domain, Private, Public -Enabled false and doing something with more sense in your life because ultimately your router (AirVPN if connected) is your firewall. I think most routers still have UPnP and NAT-PMP enabled by default. I bet many (most?) AirVPN customers have never changed any setting in their router. So leaving Windows Firewall enabled might be a good idea? And for typical Windows users never doing any changes to Windows Firewall other than allowing incoming ports for a specific program might be wise? Are they going to remember in 3 months what they did? Quote Share this post Link to post
OpenSourcerer 1450 Posted ... 3 hours ago, NaDre said: I think most routers still have UPnP and NAT-PMP enabled by default. I bet many (most?) AirVPN customers have never changed any setting in their router. So leaving Windows Firewall enabled might be a good idea? The sensible setting would be to allow practically anything for compatibility and acceptability reasons ("user friendliness") because of exactly that: Most people don't even know a firewall is running, let alone what a firewall is. The guide above should really be followed only by those who know the consequences of their actions. Also, if a port is opened through either protocols, there's still a chance whatever program requested the port to be opened might also have configured the firewall to accept that. It happens quicker than you might think, the UAC dialogue is so spammy, people instinctively click yes, thus elevating the program and letting it do whatever. 22 hours ago, Stalinium said: This guide was sponsored by windows 7 gang You run Windows 7 still? You like to play with fire, don't you? » https://distrochooser.de/en/ Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post