| ############################################################################### | |
| # OpenVPN 2.0 Sample Configuration File | |
| # for PacketiX VPN / SoftEther VPN Server | |
| # | |
| # !!! AUTO-GENERATED BY SOFTETHER VPN SERVER MANAGEMENT TOOL !!! | |
| # | |
| # !!! YOU HAVE TO REVIEW IT BEFORE USE AND MODIFY IT AS NECESSARY !!! | |
| # | |
| # This configuration file is auto-generated. You might use this config file | |
| # in order to connect to the PacketiX VPN / SoftEther VPN Server. | |
| # However, before you try it, you should review the descriptions of the file | |
| # to determine the necessity to modify to suitable for your real environment. | |
| # If necessary, you have to modify a little adequately on the file. | |
| # For example, the IP address or the hostname as a destination VPN Server | |
| # should be confirmed. | |
| # | |
| # Note that to use OpenVPN 2.0, you have to put the certification file of | |
| # the destination VPN Server on the OpenVPN Client computer when you use this | |
| # config file. Please refer the below descriptions carefully. | |
| ############################################################################### | |
| # Specify the type of the layer of the VPN connection. | |
| # | |
| # To connect to the VPN Server as a "Remote-Access VPN Client PC", | |
| # specify 'dev tun'. (Layer-3 IP Routing Mode) | |
| # | |
| # To connect to the VPN Server as a bridging equipment of "Site-to-Site VPN", | |
| # specify 'dev tap'. (Layer-2 Ethernet Bridgine Mode) | |
| dev tun | |
| ############################################################################### | |
| # Specify the underlying protocol beyond the Internet. | |
| # Note that this setting must be correspond with the listening setting on | |
| # the VPN Server. | |
| # | |
| # Specify either 'proto tcp' or 'proto udp'. | |
| proto udp | |
| ############################################################################### | |
| # The destination hostname / IP address, and port number of | |
| # the target VPN Server. | |
| # | |
| # You have to specify as 'remote <HOSTNAME> <PORT>'. You can also | |
| # specify the IP address instead of the hostname. | |
| # | |
| # Note that the auto-generated below hostname are a "auto-detected | |
| # IP address" of the VPN Server. You have to confirm the correctness | |
| # beforehand. | |
| # | |
| # When you want to connect to the VPN Server by using TCP protocol, | |
| # the port number of the destination TCP port should be same as one of | |
| # the available TCP listeners on the VPN Server. | |
| # | |
| # When you use UDP protocol, the port number must same as the configuration | |
| # setting of "OpenVPN Server Compatible Function" on the VPN Server. | |
| remote vpn.transwarp.io 1194 | |
| ############################################################################### | |
| # The HTTP/HTTPS proxy setting. | |
| # | |
| # Only if you have to use the Internet via a proxy, uncomment the below | |
| # two lines and specify the proxy address and the port number. | |
| # In the case of using proxy-authentication, refer the OpenVPN manual. | |
| ;http-proxy-retry | |
| ;http-proxy [proxy server] [proxy port] | |
| ############################################################################### | |
| # The encryption and authentication algorithm. | |
| # | |
| # Default setting is good. Modify it as you prefer. | |
| # When you specify an unsupported algorithm, the error will occur. | |
| # | |
| # The supported algorithms are as follows: | |
| # cipher: [NULL-CIPHER] NULL AES-128-CBC AES-192-CBC AES-256-CBC BF-CBC | |
| # CAST-CBC CAST5-CBC DES-CBC DES-EDE-CBC DES-EDE3-CBC DESX-CBC | |
| # RC2-40-CBC RC2-64-CBC RC2-CBC CAMELLIA-128-CBC CAMELLIA-192-CBC CAMELLIA-256-CBC | |
| # auth: SHA SHA1 SHA256 SHA384 SHA512 MD5 MD4 RMD160 | |
| cipher AES-128-CBC | |
| auth SHA1 | |
| ############################################################################### | |
| # Other parameters necessary to connect to the VPN Server. | |
| # | |
| # It is not recommended to modify it unless you have a particular need. | |
| resolv-retry infinite | |
| nobind | |
| persist-key | |
| persist-tun | |
| client | |
| verb 3 | |
| route-nopull | |
| route 172.16.0.0 255.255.0.0 vpn_gateway | |
| route 172.17.0.0 255.255.0.0 vpn_gateway | |
| route 172.18.0.0 255.255.0.0 vpn_gateway | |
| route 172.26.0.0 255.255.0.0 vpn_gateway | |
| dhcp-option DNS 172.16.20.11 | |
| ############################################################################### | |
| # Authentication with credentials. | |
| # | |
| # Comment the line out in case you want to use the certificate authentication. | |
| auth-user-pass | |
| ############################################################################### | |
| # The certificate file of the destination VPN Server. | |
| # | |
| # The CA certificate file is embedded in the inline format. | |
| # You can replace this CA contents if necessary. | |
| # Please note that if the server certificate is not a self-signed, you have to | |
| # specify the signer's root certificate (CA) here. | |
| <ca> | |
| -----BEGIN CERTIFICATE----- | |
| MIID3DCCAsSgAwIBAgIBADANBgkqhkiG9w0BAQsFADBtMR4wHAYDVQQDDBVsb2Nh | |
| bGhvc3QubG9jYWxkb21haW4xHjAcBgNVBAoMFWxvY2FsaG9zdC5sb2NhbGRvbWFp | |
| bjEeMBwGA1UECwwVbG9jYWxob3N0LmxvY2FsZG9tYWluMQswCQYDVQQGEwJVUzAe | |
| Fw0xOTA1MjQwODI1MjdaFw0zNzEyMzEwODI1MjdaMG0xHjAcBgNVBAMMFWxvY2Fs | |
| aG9zdC5sb2NhbGRvbWFpbjEeMBwGA1UECgwVbG9jYWxob3N0LmxvY2FsZG9tYWlu | |
| MR4wHAYDVQQLDBVsb2NhbGhvc3QubG9jYWxkb21haW4xCzAJBgNVBAYTAlVTMIIB | |
| IjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAxwXwz6tNW1O6c+KCmrwQLeom | |
| VlqQB+w8vf6CMLTFdPJwFRIYNs+PfNJEXyHCPYnnuW7KvVZEECF87rDHtisAwznH | |
| cJOYJy7zeeAznjeHcQoyUibrFzyi88d/tEEQS9NVOwejUzQy94oUWahFc/T/aPbv | |
| P7NI+AT6vdhFb1eLPxp11fnKDOxn2jzBc0T1OIlWVFdZHtqXXDC8yjh+HfhV4FYG | |
| TXMmXQiKAXwrxsJ+K1geyI/sDPjQ5SAy3aTXykFPgmgpJLFILqaQWnapCnhs9ZLi | |
| gCvXsZNDKnWEj0aqPbF2T2e0Eq0hJ3E4XcjBQ5AkMXRnCg3LqNFKd2mbnyh3wwID | |
| AQABo4GGMIGDMA8GA1UdEwEB/wQFMAMBAf8wCwYDVR0PBAQDAgH2MGMGA1UdJQRc | |
| MFoGCCsGAQUFBwMBBggrBgEFBQcDAgYIKwYBBQUHAwMGCCsGAQUFBwMEBggrBgEF | |
| BQcDBQYIKwYBBQUHAwYGCCsGAQUFBwMHBggrBgEFBQcDCAYIKwYBBQUHAwkwDQYJ | |
| KoZIhvcNAQELBQADggEBACTBsdeiYKS4I85uT8zy8jMCiLDbRyZ+PVLZCxgp/lgr | |
| rQ3O1lQ5lWURHTrDAqZrOcSSnhrjpadPtneTyuQ2SWERNoLMwwrNQYJv06A1AlqI | |
| aCg4GFTKyISOU6aa76VpX1Lwp+XUd8hUdnln2gD29buvsMrD5/J4/zIhUVVzZ+LU | |
| XIqIuePzBKLS3WKPfZa2vFYj2Oo3qPCyz4kASnZEElls/0tFMqHmFWoxt6U65+Hj | |
| KEOg+7f0/12oY+jvuK5syNX/6aBgC+Lqafuit+ls3QuWPbG20DDxpHL0JSZAKsbB | |
| WC2mi6NR6RmrubhyUGFNF1pzNjgH5RLETNmLVhCLUvo= | |
| -----END CERTIFICATE----- | |
| </ca> | |
| ############################################################################### | |
| # Client certificate and key. | |
| # | |
| # A pair of client certificate and private key is required in case you want to | |
| # use the certificate authentication. | |
| # | |
| # To enable it, uncomment the lines below. | |
| # Paste your certificate in the <cert> block and the key in the <key> one. | |
| ;<cert> | |
| ;-----BEGIN CERTIFICATE----- | |
| ; | |
| ;-----END CERTIFICATE----- | |
| ;</cert> | |
| ;<key> | |
| ;-----BEGIN RSA PRIVATE KEY----- | |
| ; | |
| ;-----END RSA PRIVATE KEY----- | |
| ;</key> | |