Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- router on 192.168.2.254
- openvpn pi on 192.168.2.43 wlan0, no eth0 connected
- ------------------------------------------------------------------------------------------------------------------------
- cat test.ovpn
- client
- dev tun
- proto udp
- remote my.external.ip 1194
- resolv-retry infinite
- nobind
- persist-key
- persist-tun
- mute-replay-warnings
- ns-cert-type server
- key-direction 1
- cipher AES-128-CBC
- comp-lzo
- verb 5
- mute 20
- <ca>
- -----BEGIN CERTIFICATE-----
- ------------------------------------------------------------------------------------------------------------------------
- sudo cat /etc/openvpn/server.conf
- local 192.168.2.43 # SWAP THIS NUMBER WITH YOUR RASPBERRY PI IP ADDRESS
- dev tun
- proto udp #Some people prefer to use tcp. Don't change it if you don't know.
- port 1194
- ca /etc/openvpn/easy-rsa/keys/ca.crt
- cert /etc/openvpn/easy-rsa/keys/amsterpi.crt # SWAP WITH YOUR CRT NAME
- key /etc/openvpn/easy-rsa/keys/amsterpi.key # SWAP WITH YOUR KEY NAME
- dh /etc/openvpn/easy-rsa/keys/dh2048.pem # If you changed to 2048, change that here!
- server 10.8.0.0 255.255.255.0
- # server and remote endpoints
- ifconfig 10.8.0.1 10.8.0.2
- # Add route to Client routing table for the OpenVPN Server
- push "route 10.8.0.1 255.255.255.255"
- # Add route to Client routing table for the OpenVPN Subnet
- push "route 10.8.0.0 255.255.255.0"
- # your local subnet
- push "route 192.168.2.0 255.255.255.0" # SWAP THE IP NUMBER WITH YOUR RASPBERRY PI IP ADDRESS
- # Set primary domain name server address to the SOHO Router
- # If your router does not do DNS, you can use Google DNS 8.8.8.8
- push "dhcp-option DNS 192.168.2.254" # This should already match your router address and not need to be changed.
- # Override the Client default gateway by using 0.0.0.0/1 and
- # 128.0.0.0/1 rather than 0.0.0.0/0. This has the benefit of
- # overriding but not wiping out the original default gateway.
- push "redirect-gateway local def1"
- client-to-client
- duplicate-cn
- keepalive 10 120
- tls-auth /etc/openvpn/easy-rsa/keys/ta.key 0
- cipher AES-128-CBC
- comp-lzo
- user nobody
- group nogroup
- persist-key
- persist-tun
- status /var/log/openvpn-status.log 20
- log /var/log/openvpn.log
- verb 5
- ------------------------------------------------------------------------------------------------------------------------
- sudo cat /etc/firewall-openvpn-rules.sh
- #!/bin/sh
- iptables -t nat -A POSTROUTING -s 10.8.0.0/24 -o wlan0 -j SNAT --to-source 192.168.2.43
- iptables -t nat -A POSTROUTING -s 10.8.0.0/24 -o wlan0 -j MASQUERADE
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement