SHARE
TWEET

UDP - Client

a guest Apr 26th, 2017 15 Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. ##############################################
  2. # Sample client-side OpenVPN 2.0 config file #
  3. # for connecting to multi-client server.     #
  4. #                                            #
  5. # This configuration can be used by multiple #
  6. # clients, however each client should have   #
  7. # its own cert and key files.                #
  8. #                                            #
  9. # On Windows, you might want to rename this  #
  10. # file so it has a .ovpn extension           #
  11. ##############################################
  12.  
  13. # Personal - Nivel de autenticaciĆ³n
  14. #auth SHA512
  15.  
  16. # Specify that we are a client and that we
  17. # will be pulling certain config file directives
  18. # from the server.
  19. client
  20.  
  21. # Use the same setting as you are using on
  22. # the server.
  23. # On most systems, the VPN will not function
  24. # unless you partially or fully disable
  25. # the firewall for the TUN/TAP interface.
  26. ;dev tap
  27. dev tun
  28.  
  29. # Windows needs the TAP-Win32 adapter name
  30. # from the Network Connections panel
  31. # if you have more than one.  On XP SP2,
  32. # you may need to disable the firewall
  33. # for the TAP adapter.
  34. ;dev-node MyTap
  35.  
  36. # Are we connecting to a TCP or
  37. # UDP server?  Use the same setting as
  38. # on the server.
  39. # AƱadido el 4 para forzar el uso exclusico de IPv4. Si se quiere usar IPv4 e IPv6, eliminar el 4
  40. ;proto tcp4
  41. proto udp4
  42.  
  43. # The hostname/IP and port of the server.
  44. # You can have multiple remote entries
  45. # to load balance between the servers.
  46. remote XXX.XXX.XXX.XXX XXXXX
  47. ;remote my-server-2 1194
  48.  
  49. # Choose a random host from the remote
  50. # list for load-balancing.  Otherwise
  51. # try hosts in the order specified.
  52. ;remote-random
  53.  
  54. # Keep trying indefinitely to resolve the
  55. # host name of the OpenVPN server.  Very useful
  56. # on machines which are not permanently connected
  57. # to the internet such as laptops.
  58. resolv-retry infinite
  59.  
  60. # Most clients don't need to bind to
  61. # a specific local port number.
  62. nobind
  63.  
  64. # Downgrade privileges after initialization (non-Windows only)
  65. ;user nobody
  66. ;group nobody
  67.  
  68. # Try to preserve some state across restarts.
  69. persist-key
  70. persist-tun
  71.  
  72. # If you are connecting through an
  73. # HTTP proxy to reach the actual OpenVPN
  74. # server, put the proxy server/IP and
  75. # port number here.  See the man page
  76. # if your proxy server requires
  77. # authentication.
  78. ;http-proxy-retry # retry on connection failures
  79. ;http-proxy [proxy server] [proxy port #]
  80.  
  81. # Wireless networks often produce a lot
  82. # of duplicate packets.  Set this flag
  83. # to silence duplicate packet warnings.
  84. ;mute-replay-warnings
  85.  
  86. # SSL/TLS parms.
  87. # See the server config file for more
  88. # description.  It's best to use
  89. # a separate .crt/.key file pair
  90. # for each client.  A single ca
  91. # file can be used for all clients.
  92. ca ca.crt
  93. cert client.crt
  94. key client.key
  95.  
  96. # Verify server certificate by checking that the
  97. # certicate has the correct key usage set.
  98. # This is an important precaution to protect against
  99. # a potential attack discussed here:
  100. #  http://openvpn.net/howto.html#mitm
  101. #
  102. # To use this feature, you will need to generate
  103. # your server certificates with the keyUsage set to
  104. #   digitalSignature, keyEncipherment
  105. # and the extendedKeyUsage to
  106. #   serverAuth
  107. # EasyRSA can do this for you.
  108. remote-cert-tls server
  109.  
  110. # If a tls-auth key is used on the server
  111. # then every client must also have the key.
  112. tls-crypt ta.key 1
  113.  
  114. # Select a cryptographic cipher.
  115. # If the cipher option is used on the server
  116. # then you must also specify it here.
  117. # Note that 2.4 client/server will automatically
  118. # negotiate AES-256-GCM in TLS mode.
  119. # See also the ncp-cipher option in the manpage
  120. cipher AES-256-GCM
  121.  
  122. # Enable compression on the VPN link.
  123. # Don't enable this unless it is also
  124. # enabled in the server config file.
  125. #comp-lzo
  126.  
  127. # Set log file verbosity.
  128. verb 4
  129.  
  130. # Silence repeating messages
  131. ;mute 20
RAW Paste Data
We use cookies for various purposes including analytics. By continuing to use Pastebin, you agree to our use of cookies as described in the Cookies Policy. OK, I Understand
Not a member of Pastebin yet?
Sign Up, it unlocks many cool features!
 
Top