File size: 6,491 Bytes
9c0f316 |
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 |
###############################################################################
# OpenVPN 2.0 Sample Configuration File
# for PacketiX VPN / SoftEther VPN Server
#
# !!! AUTO-GENERATED BY SOFTETHER VPN SERVER MANAGEMENT TOOL !!!
#
# !!! YOU HAVE TO REVIEW IT BEFORE USE AND MODIFY IT AS NECESSARY !!!
#
# This configuration file is auto-generated. You might use this config file
# in order to connect to the PacketiX VPN / SoftEther VPN Server.
# However, before you try it, you should review the descriptions of the file
# to determine the necessity to modify to suitable for your real environment.
# If necessary, you have to modify a little adequately on the file.
# For example, the IP address or the hostname as a destination VPN Server
# should be confirmed.
#
# Note that to use OpenVPN 2.0, you have to put the certification file of
# the destination VPN Server on the OpenVPN Client computer when you use this
# config file. Please refer the below descriptions carefully.
###############################################################################
# Specify the type of the layer of the VPN connection.
#
# To connect to the VPN Server as a "Remote-Access VPN Client PC",
# specify 'dev tun'. (Layer-3 IP Routing Mode)
#
# To connect to the VPN Server as a bridging equipment of "Site-to-Site VPN",
# specify 'dev tap'. (Layer-2 Ethernet Bridgine Mode)
dev tun
###############################################################################
# Specify the underlying protocol beyond the Internet.
# Note that this setting must be correspond with the listening setting on
# the VPN Server.
#
# Specify either 'proto tcp' or 'proto udp'.
proto udp
###############################################################################
# The destination hostname / IP address, and port number of
# the target VPN Server.
#
# You have to specify as 'remote <HOSTNAME> <PORT>'. You can also
# specify the IP address instead of the hostname.
#
# Note that the auto-generated below hostname are a "auto-detected
# IP address" of the VPN Server. You have to confirm the correctness
# beforehand.
#
# When you want to connect to the VPN Server by using TCP protocol,
# the port number of the destination TCP port should be same as one of
# the available TCP listeners on the VPN Server.
#
# When you use UDP protocol, the port number must same as the configuration
# setting of "OpenVPN Server Compatible Function" on the VPN Server.
remote vpn.transwarp.io 1194
###############################################################################
# The HTTP/HTTPS proxy setting.
#
# Only if you have to use the Internet via a proxy, uncomment the below
# two lines and specify the proxy address and the port number.
# In the case of using proxy-authentication, refer the OpenVPN manual.
;http-proxy-retry
;http-proxy [proxy server] [proxy port]
###############################################################################
# The encryption and authentication algorithm.
#
# Default setting is good. Modify it as you prefer.
# When you specify an unsupported algorithm, the error will occur.
#
# The supported algorithms are as follows:
# cipher: [NULL-CIPHER] NULL AES-128-CBC AES-192-CBC AES-256-CBC BF-CBC
# CAST-CBC CAST5-CBC DES-CBC DES-EDE-CBC DES-EDE3-CBC DESX-CBC
# RC2-40-CBC RC2-64-CBC RC2-CBC CAMELLIA-128-CBC CAMELLIA-192-CBC CAMELLIA-256-CBC
# auth: SHA SHA1 SHA256 SHA384 SHA512 MD5 MD4 RMD160
cipher AES-128-CBC
auth SHA1
###############################################################################
# Other parameters necessary to connect to the VPN Server.
#
# It is not recommended to modify it unless you have a particular need.
resolv-retry infinite
nobind
persist-key
persist-tun
client
verb 3
route-nopull
route 172.16.0.0 255.255.0.0 vpn_gateway
route 172.17.0.0 255.255.0.0 vpn_gateway
route 172.18.0.0 255.255.0.0 vpn_gateway
route 172.26.0.0 255.255.0.0 vpn_gateway
dhcp-option DNS 172.16.20.11
###############################################################################
# Authentication with credentials.
#
# Comment the line out in case you want to use the certificate authentication.
auth-user-pass
###############################################################################
# The certificate file of the destination VPN Server.
#
# The CA certificate file is embedded in the inline format.
# You can replace this CA contents if necessary.
# Please note that if the server certificate is not a self-signed, you have to
# specify the signer's root certificate (CA) here.
<ca>
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
</ca>
###############################################################################
# Client certificate and key.
#
# A pair of client certificate and private key is required in case you want to
# use the certificate authentication.
#
# To enable it, uncomment the lines below.
# Paste your certificate in the <cert> block and the key in the <key> one.
;<cert>
;-----BEGIN CERTIFICATE-----
;
;-----END CERTIFICATE-----
;</cert>
;<key>
;-----BEGIN RSA PRIVATE KEY-----
;
;-----END RSA PRIVATE KEY-----
;</key>
|