Reading this article on how to configure OpenVPN, I see the following paragraph:
Raspbian has a firewall to protect your Raspberry Pi from unknown and unexpected Internet sources. We still want the firewall to protect us from most incoming and outgoing network traffic, but we need to poke an OpenVPN-shaped hole in the firewall.
The article then suggests using this iptables rule to solve this problem:
iptables -t nat -A POSTROUTING -s 10.8.0.0/24 -o eth0 -j SNAT --to-source 192.168.XX.X
with 10.8.0.0 being the default address of the VPN for the clients connected to the VPN, and 192.168.XX.X being the IP address of the OpenVPN server on the local network.
I might be completely misunderstanding this, but I thought this rule meant "for each packet with source IP address 10.8.0.0, change the source IP address to 192.168.XX.X before routing it out the eth0 interface".
If this is correct, how would this "poke an OpenVPN-shaped hole in the firewall"?