RUT241 RMS VPN Hub - Firewall Zone Missing Interface Binding

RUT241 RMS VPN Hub — Firewall Zone Missing Interface Binding (tun device not assigned)

Device: RUT241
Firmware: RUT2M_R_00.07.21.3 (Build 2026-03-20)
Kernel: 5.15.197
RMS VPN Hub type: TUN


Summary

After setting up an RMS VPN Hub and connecting a RUT241 as a device client, the VPN tunnel establishes successfully but no traffic is forwarded from the VPN tunnel to the LAN interface. Devices on the LAN (in my case a Siemens S7-1200 PLC) are completely unreachable through the VPN, even though the tunnel is up, the RMS hub shows both client and device connected, and the firewall zone configuration appears correct in the WebUI.

The root cause is that the auto-created firewall zone rms_ojrRP4g has no covered network/interface assigned to it. The tunnel interface tun_c_ojrRP4g exists and is operational, but was never bound to the zone during RMS auto-provisioning.
——-

That was a short review written by Claude, with it’s help I was able to connect my PLC via RUT241. It took a couple of hours with trying and testing. I am not networking savvy enough to be able to solve this, honestly if it weren’t for AI I don’t think I would solve this. I would probably try with different version of firmware.

It’s s a pity such bugs happen, anytime I try to establish a new connection there is some setting/issue, the first module I received actually had a bad power supply… And you think your settings are wrong or something that it just disconnects.

Anyway, it now connects. I had Claude write an extensive report of what was done (honestly it is gibberish to me), but it is a very long report and probably has some private information. I can share it directly with Teltonika hotline if there is such wish.

Greetings @Urbanslo,

Thank you for reaching out.

Could you please share the solution that helped you resolve this issue? It may be beneficial for other community members facing a similar situation.

I attempted to replicate the issue on my end, but was unable to do so. After creating a VPN hub, the zone appeared as expected, and I only needed to enable masquerading under Firewall → Zones .

Could you also let me know if there was any prior configuration on the device that might have interfered with this behavior?

I look forward to your reply.

Kind regards,
V.

Thanks for your help, masquerading was automatically switched on (when the zone was added by the hub):

image

However communication didn’t work, until I executed this command:
ssh root@192.168.0.200 (to login)

and then:

echo ‘* * * * * iptables -C FORWARD -i tun_c_FUpNp8a -o br-lan -j ACCEPT 2>/dev/null || (iptables -I FORWARD -i tun_c_FUpNp8a -o br-lan -j ACCEPT; iptables -t nat -I POSTROUTING -o br-lan -s 192.168.255.0/24 -j MASQUERADE)’ > /etc/crontabs/root /etc/init.d/cron restart

After that I can ping the PLC and also go online.

Here is an explanation from Claude:

The zone does appear, but the Covered networks field inside the zone is empty — no interface is assigned. The tun device (tun_c_FUpNp8a) exists and is UP, and UCI shows device='tun_c_FUpNp8a' in the zone config, but the WebUI dropdown doesn’t list the tun interface as a selectable option. Masquerading was already enabled on the zone — that alone didn’t fix it.

Steps to reproduce:

  1. Factory reset RUT241 (firmware RUT2M_R_00.07.22.1)

  2. Connect to internet via WiFi client (no SIM)

  3. Register to RMS, create VPN Hub (TUN mode), add device

  4. VPN tunnel establishes, zone auto-created

  5. Go to Firewall → Zones → Edit the rms_* zone → Covered networks is “Please select” with no tun interface in the dropdown

  6. Ping from VPN client to LAN device fails

  7. Manual iptables -I FORWARD -i tun_c_FUpNp8a -o br-lan -j ACCEPT fixes it immediately

No prior configuration — tested on a fresh factory-reset device. Confirmed on both RUT2M_R_00.07.21.3 and RUT2M_R_00.07.22.1.

A different RUT241 on firmware RUT2M_R_00.07.17.3 does NOT have this issue.

UCI output showing the zone config: firewall.28.device='tun_c_ojrRP4g' is set, but iptables FORWARD chain has no matching interface-specific rule.

Hello,

To resolve the issue with accessing LAN devices through RMS VPN Hub, please apply the configuration directly in RMS and the router firewall, as the issue is related to missing routing/forwarding configuration rather than firewall persistence.

Please follow these steps:

  1. Enable LAN forwarding in RMS VPN Hub

In the RMS Portal:

  • Open VPN Hub
  • Select the relevant device
  • Enable LAN forwarding

This allows VPN clients to access networks behind the router.

  1. Add LAN route in RMS

In the same VPN Hub configuration:

  • Go to Routes
  • Add the LAN subnet behind the router (e.g. 192.168.255.0/24)
  • Assign it to the correct device

This ensures the VPN Hub knows which network is reachable through the router.

  1. Check firewall zone on the router

On the router WebUI:

  • Go to Network → Firewall → Zones
  • Locate the RMS/VPN-related zone

Ensure that:

  • Forwarding from VPN zone → LAN is enabled
  • Masquerading is enabled
  1. Apply configuration
  • Save and apply changes on both RMS and router
  • Re-test connectivity to LAN devices

Important note: This issue does not require cron jobs or manual iptables rules. Those workarounds are typically used when firewall integration is incomplete, but in a correct RMS VPN Hub setup, routing and firewall forwarding should handle this natively.

Kind regards,
V.