Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Клиент
- ##############################################
- # Sample client-side OpenVPN 2.0 config file #
- # for connecting to multi-client server. #
- # #
- # This configuration can be used by multiple #
- # clients, however each client should have #
- # its own cert and key files. #
- # #
- # On Windows, you might want to rename this #
- # file so it has a .ovpn extension #
- ##############################################
- # Specify that we are a client and that we
- # will be pulling certain config file directives
- # from the server.
- client
- # Use the same setting as you are using on
- # the server.
- # On most systems, the VPN will not function
- # unless you partially or fully disable
- # the firewall for the TUN/TAP interface.
- ;dev tun
- dev tap
- # Windows needs the TAP-Win32 adapter name
- # from the Network Connections panel
- # if you have more than one. On XP SP2,
- # you may need to disable the firewall
- # for the TAP adapter.
- ;dev-node MyTap
- # Are we connecting to a TCP or
- # UDP server? Use the same setting as
- # on the server.
- ;proto tcp
- proto tcp
- # The hostname/IP and port of the server.
- # You can have multiple remote entries
- # to load balance between the servers.
- remote my-server 1194
- # remote 178.124.163.245 1194
- ;remote my-server-2 1194
- # Choose a random host from the remote
- # list for load-balancing. Otherwise
- # try hosts in the order specified.
- ;remote-random
- # Keep trying indefinitely to resolve the
- # host name of the OpenVPN server. Very useful
- # on machines which are not permanently connected
- # to the internet such as laptops.
- #resolv-retry infinite
- # Most clients don't need to bind to
- # a specific local port number.
- nobind
- # Downgrade privileges after initialization (non-Windows only)
- ;user nobody
- ;group nobody
- # Try to preserve some state across restarts.
- persist-key
- persist-tun
- # If you are connecting through an
- # HTTP proxy to reach the actual OpenVPN
- # server, put the proxy server/IP and
- # port number here. See the man page
- # if your proxy server requires
- # authentication.
- ;http-proxy-retry # retry on connection failures
- ;http-proxy [proxy server] [proxy port #]
- # Wireless networks often produce a lot
- # of duplicate packets. Set this flag
- # to silence duplicate packet warnings.
- ;mute-replay-warnings
- # SSL/TLS parms.
- # See the server config file for more
- # description. It's best to use
- # a separate .crt/.key file pair
- # for each client. A single ca
- # file can be used for all clients.
- ca ca.crt
- cert admin.crt
- key admin.key
- # Verify server certificate by checking
- # that the certicate has the nsCertType
- # field set to "server". This is an
- # important precaution to protect against
- # a potential attack discussed here:
- # http://openvpn.net/howto.html#mitm
- #
- # To use this feature, you will need to generate
- # your server certificates with the nsCertType
- # field set to "server". The build-key-server
- # script in the easy-rsa folder will do this.
- ns-cert-type server
- route-method exe
- route-delay 10
- tun-mtu 1300
- # If a tls-auth key is used on the server
- # then every client must also have the key.
- tls-auth ta.key 1
- # Select a cryptographic cipher.
- # If the cipher option is used on the server
- # then you must also specify it here.
- cipher BF-CBC
- # Enable compression on the VPN link.
- # Don't enable this unless it is also
- # enabled in the server config file.
- comp-lzo
- # Set log file verbosity.
- verb 5
- # Silence repeating messages
- ;mute 20
- Сервер
- port 1194
- # на сайте разработчиков рекомендуется использовать udp в том числе
- # по соображениям безопасности, но для нормальной работы удаленной
- # печати, рекомендую использовать tcp
- proto tcp-server
- dev tap
- ca "ca.crt"
- cert "server.crt"
- key "server.key"
- # Этот файл хранить в секрете!
- dh "dh1024.pem"
- # включаем TLS аутификацию
- tls-server
- # указываем tls-ключ, и указываем 0 для сервера, а 1 для клиента
- tls-auth "ta.key" 0
- # таймаут до реконекта
- tls-timeout 120
- # задаем IP-адрес сервера и маску подсети
- server 10.0.8.0 255.255.255.0
- # разрешаем использовать одинаковые ключи
- #duplicate-cn
- # задаем МАРШРУТ который передаём клиенту
- # и маску подсети для того чтобы он "видел"
- # сеть за OpenVPN сервером (сеть 192.168.1.0/24)
- # push "route 192.168.1.0 255.255.255.0"
- # удерживать соединение (полезно при работе через nat, proxy и т.п.)
- keepalive 10 120
- # маршруты добавляются через exe
- route-method exe
- route-delay 10
- tun-mtu 1300
- # шлюз в openvpn сеть
- #route-gateway 10.0.8.1
- # маршрут на всю сеть
- #route 10.0.8.0 255.255.255.0
- # включаем шифрацию пакетов
- cipher BF-CBC
- # включить сжатие
- comp-lzo
- # максимум клиентов
- max-clients 10
- # Не перечитывать ключи после получения
- persist-key
- # Не закрывать и переоткрывать TUNTAP
- # устройство, после получения
- # SIGUSR1 или ping-restart
- persist-tun
- # клиенты могут "видеть" друг друга
- client-config-dir ccd
- client-to-client
- status "openvpn-status.log"
- log "openvpn.log"
- log-append "openvpn.log"
- # уровень детализации отчетов
- verb 5
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement