Guest User

UDP - Client

a guest
Apr 26th, 2017
19
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. ##############################################
  2. # Sample client-side OpenVPN 2.0 config file #
  3. # for connecting to multi-client server. #
  4. # #
  5. # This configuration can be used by multiple #
  6. # clients, however each client should have #
  7. # its own cert and key files. #
  8. # #
  9. # On Windows, you might want to rename this #
  10. # file so it has a .ovpn extension #
  11. ##############################################
  12.  
  13. # Personal - Nivel de autenticación
  14. #auth SHA512
  15.  
  16. # Specify that we are a client and that we
  17. # will be pulling certain config file directives
  18. # from the server.
  19. client
  20.  
  21. # Use the same setting as you are using on
  22. # the server.
  23. # On most systems, the VPN will not function
  24. # unless you partially or fully disable
  25. # the firewall for the TUN/TAP interface.
  26. ;dev tap
  27. dev tun
  28.  
  29. # Windows needs the TAP-Win32 adapter name
  30. # from the Network Connections panel
  31. # if you have more than one. On XP SP2,
  32. # you may need to disable the firewall
  33. # for the TAP adapter.
  34. ;dev-node MyTap
  35.  
  36. # Are we connecting to a TCP or
  37. # UDP server? Use the same setting as
  38. # on the server.
  39. # Añadido el 4 para forzar el uso exclusico de IPv4. Si se quiere usar IPv4 e IPv6, eliminar el 4
  40. ;proto tcp4
  41. proto udp4
  42.  
  43. # The hostname/IP and port of the server.
  44. # You can have multiple remote entries
  45. # to load balance between the servers.
  46. remote XXX.XXX.XXX.XXX XXXXX
  47. ;remote my-server-2 1194
  48.  
  49. # Choose a random host from the remote
  50. # list for load-balancing. Otherwise
  51. # try hosts in the order specified.
  52. ;remote-random
  53.  
  54. # Keep trying indefinitely to resolve the
  55. # host name of the OpenVPN server. Very useful
  56. # on machines which are not permanently connected
  57. # to the internet such as laptops.
  58. resolv-retry infinite
  59.  
  60. # Most clients don't need to bind to
  61. # a specific local port number.
  62. nobind
  63.  
  64. # Downgrade privileges after initialization (non-Windows only)
  65. ;user nobody
  66. ;group nobody
  67.  
  68. # Try to preserve some state across restarts.
  69. persist-key
  70. persist-tun
  71.  
  72. # If you are connecting through an
  73. # HTTP proxy to reach the actual OpenVPN
  74. # server, put the proxy server/IP and
  75. # port number here. See the man page
  76. # if your proxy server requires
  77. # authentication.
  78. ;http-proxy-retry # retry on connection failures
  79. ;http-proxy [proxy server] [proxy port #]
  80.  
  81. # Wireless networks often produce a lot
  82. # of duplicate packets. Set this flag
  83. # to silence duplicate packet warnings.
  84. ;mute-replay-warnings
  85.  
  86. # SSL/TLS parms.
  87. # See the server config file for more
  88. # description. It's best to use
  89. # a separate .crt/.key file pair
  90. # for each client. A single ca
  91. # file can be used for all clients.
  92. ca ca.crt
  93. cert client.crt
  94. key client.key
  95.  
  96. # Verify server certificate by checking that the
  97. # certicate has the correct key usage set.
  98. # This is an important precaution to protect against
  99. # a potential attack discussed here:
  100. # http://openvpn.net/howto.html#mitm
  101. #
  102. # To use this feature, you will need to generate
  103. # your server certificates with the keyUsage set to
  104. # digitalSignature, keyEncipherment
  105. # and the extendedKeyUsage to
  106. # serverAuth
  107. # EasyRSA can do this for you.
  108. remote-cert-tls server
  109.  
  110. # If a tls-auth key is used on the server
  111. # then every client must also have the key.
  112. tls-crypt ta.key 1
  113.  
  114. # Select a cryptographic cipher.
  115. # If the cipher option is used on the server
  116. # then you must also specify it here.
  117. # Note that 2.4 client/server will automatically
  118. # negotiate AES-256-GCM in TLS mode.
  119. # See also the ncp-cipher option in the manpage
  120. cipher AES-256-GCM
  121.  
  122. # Enable compression on the VPN link.
  123. # Don't enable this unless it is also
  124. # enabled in the server config file.
  125. #comp-lzo
  126.  
  127. # Set log file verbosity.
  128. verb 4
  129.  
  130. # Silence repeating messages
  131. ;mute 20
RAW Paste Data