Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- client.conf
- # Custom user conf file for OpenVPN client
- # Please add needed params only!
- ### If your server certificates with the nsCertType field set to "server"
- ns-cert-type server
- ### Process priority level (0..19)
- nice 0
- ### Syslog verbose level
- verb 0
- mute 10
- =================
- server.conf
- # Custom user conf file for OpenVPN server
- # Please add needed params only!
- ### Authenticate packets with HMAC using message digest algorithm
- auth SHA1 # SHA1 160 bit (default)
- ;auth SHA256 # SHA256 256 bit
- ;auth SHA512 # SHA512 512 bit
- ### Encrypt packets with cipher algorithm
- cipher BF-CBC # Blowfish 128 bit (default)
- ;cipher AES-128-CBC # AES 128 bit
- ;cipher AES-256-CBC # AES 256 bit
- ;cipher DES-EDE3-CBC # Triple-DES 192 bit
- ;cipher none # No encryption
- ### Enable LZO compression on the VPN link
- comp-lzo
- ### Max clients limit
- max-clients 10
- ### Internally route client-to-client traffic
- client-to-client
- ### Allow clients with duplicate "Common Name"
- ;duplicate-cn
- ### Keepalive and timeout
- keepalive 10 60
- ### Process priority level (0..19)
- nice 3
- ### Syslog verbose level
- verb 0
- mute 10
- ==============================
- OVPN file
- ##############################################
- # Sample client-side OpenVPN 2.0 config file #
- # for connecting to multi-client server. #
- # #
- # This configuration can be used by multiple #
- # clients, however each client should have #
- # its own cert and key files. #
- # #
- # On Windows, you might want to rename this #
- # file so it has a .ovpn extension #
- ##############################################
- # Specify that we are a client and that we
- # will be pulling certain config file directives
- # from the server.
- client
- # Use the same setting as you are using on
- # the server.
- # On most systems, the VPN will not function
- # unless you partially or fully disable
- # the firewall for the TUN/TAP interface.
- dev tap
- #dev tun
- # Windows needs the TAP-Win32 adapter name
- # from the Network Connections panel
- # if you have more than one. On XP SP2,
- # you may need to disable the firewall
- # for the TAP adapter.
- dev-node TAP
- # Are we connecting to a TCP or
- # UDP server? Use the same setting as
- # on the server.
- proto tcp
- #proto udp
- # The hostname/IP and port of the server.
- # You can have multiple remote entries
- # to load balance between the servers.
- remote X.X.X.X 1194
- #;remote my-server-2 1194
- # Choose a random host from the remote
- # list for load-balancing. Otherwise
- # try hosts in the order specified.
- ;remote-random
- # Keep trying indefinitely to resolve the
- # host name of the OpenVPN server. Very useful
- # on machines which are not permanently connected
- # to the internet such as laptops.
- resolv-retry infinite
- # Most clients don't need to bind to
- # a specific local port number.
- nobind
- # Downgrade privileges after initialization (non-Windows only)
- ;user nobody
- ;group nobody
- # Try to preserve some state across restarts.
- persist-key
- persist-tun
- # If you are connecting through an
- # HTTP proxy to reach the actual OpenVPN
- # server, put the proxy server/IP and
- # port number here. See the man page
- # if your proxy server requires
- # authentication.
- ;http-proxy-retry # retry on connection failures
- ;http-proxy [proxy server] [proxy port #]
- # Wireless networks often produce a lot
- # of duplicate packets. Set this flag
- # to silence duplicate packet warnings.
- ;mute-replay-warnings
- # SSL/TLS parms.
- # See the server config file for more
- # description. It's best to use
- # a separate .crt/.key file pair
- # for each client. A single ca
- # file can be used for all clients.
- ca "C:\\Program Files\\OpenVPN\\config\\ca.crt"
- cert "C:\\Program Files\\OpenVPN\\config\\client.crt"
- key "C:\\Program Files\\OpenVPN\\config\\client.key"
- # Verify server certificate by checking that the
- # certicate has the correct key usage set.
- # This is an important precaution to protect against
- # a potential attack discussed here:
- # http://openvpn.net/howto.html#mitm
- #
- # To use this feature, you will need to generate
- # your server certificates with the keyUsage set to
- # digitalSignature, keyEncipherment
- # and the extendedKeyUsage to
- # serverAuth
- # EasyRSA can do this for you.
- remote-cert-tls server
- # If a tls-auth key is used on the server
- # then every client must also have the key.
- tls-auth ta.key 1
- # Select a cryptographic cipher.
- # If the cipher option is used on the server
- # then you must also specify it here.
- ;cipher x
- # Enable compression on the VPN link.
- # Don't enable this unless it is also
- # enabled in the server config file.
- comp-lzo
- # Set log file verbosity.
- verb 3
- # Silence repeating messages
- ;mute 20
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement