Advertisement
Guest User

openvpn_conf

a guest
Feb 14th, 2019
692
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.94 KB | None | 0 0
  1. client
  2. dev tap
  3. tun-mtu 1500
  4.  
  5. # Windows needs the TAP-Win32 adapter name
  6. # from the Network Connections panel
  7. # if you have more than one. On XP SP2,
  8. # you may need to disable the firewall
  9. # for the TAP adapter.
  10. ;dev-node MyTap
  11.  
  12. # Are we connecting to a TCP or
  13. # UDP server? Use the same setting as
  14. # on the server.
  15. ;proto tcp
  16. proto udp
  17.  
  18. # The hostname/IP and port of the server.
  19. # You can have multiple remote entries
  20. # to load balance between the servers.
  21. remote abc.xyz.de 7998
  22. ;remote my-server-2 1194
  23.  
  24. # Choose a random host from the remote
  25. # list for load-balancing. Otherwise
  26. # try hosts in the order specified.
  27. ;remote-random
  28.  
  29. # Keep trying indefinitely to resolve the
  30. # host name of the OpenVPN server. Very useful
  31. # on machines which are not permanently connected
  32. # to the internet such as laptops.
  33. resolv-retry infinite
  34.  
  35. # Most clients don't need to bind to
  36. # a specific local port number.
  37. nobind
  38.  
  39. # Downgrade privileges after initialization (non-Windows only)
  40. ;user nobody
  41. ;group nobody
  42.  
  43. # Try to preserve some state across restarts.
  44. persist-key
  45. persist-tun
  46.  
  47. # If you are connecting through an
  48. # HTTP proxy to reach the actual OpenVPN
  49. # server, put the proxy server/IP and
  50. # port number here. See the man page
  51. # if your proxy server requires
  52. # authentication.
  53. ;http-proxy-retry # retry on connection failures
  54. ;http-proxy [proxy server] [proxy port #]
  55.  
  56.  
  57.  
  58. # Wireless networks often produce a lot
  59. # of duplicate packets. Set this flag
  60. # to silence duplicate packet warnings.
  61. ;mute-replay-warnings
  62.  
  63. # SSL/TLS parms.
  64. # See the server config file for more
  65. # description. It's best to use
  66. # a separate .crt/.key file pair
  67. # for each client. A single ca
  68. # file can be used for all clients.
  69. ca allow_access.crt
  70. cert hw01_at_xyz.de.crt
  71. key hw01_at_xyz.de.key
  72.  
  73.  
  74.  
  75. # Verify server certificate by checking
  76. # that the certicate has the nsCertType
  77. # field set to "server". This is an
  78. # important precaution to protect against
  79. # a potential attack discussed here:
  80. # http://openvpn.net/howto.html#mitm
  81. #
  82. # To use this feature, you will need to generate
  83. # your server certificates with the nsCertType
  84. # field set to "server". The build-key-server
  85. # script in the easy-rsa folder will do this.
  86. ;ns-cert-type server
  87.  
  88. # If a tls-auth key is used on the server
  89. # then every client must also have the key.
  90. ;tls-auth ta.key 1
  91.  
  92. # Select a cryptographic cipher.
  93. # If the cipher option is used on the server
  94. # then you must also specify it here.
  95. ;cipher x
  96.  
  97. # Enable compression on the VPN link.
  98. # Don't enable this unless it is also
  99. # enabled in the server config file.
  100. ;comp-lzo
  101.  
  102. # Set log file verbosity.
  103. verb 3
  104.  
  105. # Silence repeating messages
  106. ;mute 20
  107.  
  108. script-security 2
  109. #up "/etc/openvpn/up.sh"
  110. 108,7 Bot
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement