Open UDP port 1194 (YaST > Security and Users > Firewall > Allowed Services). Status /var/log/openvpn/openvpn-status.log #Enable multiple client to connect with same key #Provide DNS servers to the client, you can use goolge DNS #this line will redirect all traffic through our OpenVPN #Internal IP will get when already connect #See the size a dh key in /etc/openvpn/keys/ # "dev tun" will create a routed IP tunnel.Īskpass /etc/easy-rsa/pki/private/server.pass See for more information on the configuration file. Also, substitute the appropriate client name for cert, key, and paths. Note that '192.168.1.100' should be the actual IP address of the server running OpenVPN. Rsync -av -e "ssh -p 22" /local/path/to/store FilenameĬreate a nf file for each client with the following content: Your new CA certificate file for publishing is at: If you enter '.', the field will be left blank.Ĭommon Name (eg: your user, host, or server name) :ĬA creation complete and you may now import and sign cert requests. There are quite a few fields but you can leave some blankįor some fields there will be a default value, What you are about to enter is what is called a Distinguished Name or a DN. You are about to be asked to enter information that will be incorporated Writing new private key to '/etc/easy-rsa/pki/private/ca.key.lyD9dCZFDq' Note: using Easy-RSA configuration from: /etc/easy-rsa/vars Press enter to accept the default values, or modify them.
0 Comments
Leave a Reply. |