Wendy-Fly commited on
Commit
9c0f316
·
verified ·
1 Parent(s): 7e1d0ea

Upload Transwarp-SH.ovpn with huggingface_hub

Browse files
Files changed (1) hide show
  1. Transwarp-SH.ovpn +177 -0
Transwarp-SH.ovpn ADDED
@@ -0,0 +1,177 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ ###############################################################################
2
+ # OpenVPN 2.0 Sample Configuration File
3
+ # for PacketiX VPN / SoftEther VPN Server
4
+ #
5
+ # !!! AUTO-GENERATED BY SOFTETHER VPN SERVER MANAGEMENT TOOL !!!
6
+ #
7
+ # !!! YOU HAVE TO REVIEW IT BEFORE USE AND MODIFY IT AS NECESSARY !!!
8
+ #
9
+ # This configuration file is auto-generated. You might use this config file
10
+ # in order to connect to the PacketiX VPN / SoftEther VPN Server.
11
+ # However, before you try it, you should review the descriptions of the file
12
+ # to determine the necessity to modify to suitable for your real environment.
13
+ # If necessary, you have to modify a little adequately on the file.
14
+ # For example, the IP address or the hostname as a destination VPN Server
15
+ # should be confirmed.
16
+ #
17
+ # Note that to use OpenVPN 2.0, you have to put the certification file of
18
+ # the destination VPN Server on the OpenVPN Client computer when you use this
19
+ # config file. Please refer the below descriptions carefully.
20
+
21
+
22
+ ###############################################################################
23
+ # Specify the type of the layer of the VPN connection.
24
+ #
25
+ # To connect to the VPN Server as a "Remote-Access VPN Client PC",
26
+ # specify 'dev tun'. (Layer-3 IP Routing Mode)
27
+ #
28
+ # To connect to the VPN Server as a bridging equipment of "Site-to-Site VPN",
29
+ # specify 'dev tap'. (Layer-2 Ethernet Bridgine Mode)
30
+
31
+ dev tun
32
+
33
+
34
+ ###############################################################################
35
+ # Specify the underlying protocol beyond the Internet.
36
+ # Note that this setting must be correspond with the listening setting on
37
+ # the VPN Server.
38
+ #
39
+ # Specify either 'proto tcp' or 'proto udp'.
40
+
41
+ proto udp
42
+
43
+
44
+ ###############################################################################
45
+ # The destination hostname / IP address, and port number of
46
+ # the target VPN Server.
47
+ #
48
+ # You have to specify as 'remote <HOSTNAME> <PORT>'. You can also
49
+ # specify the IP address instead of the hostname.
50
+ #
51
+ # Note that the auto-generated below hostname are a "auto-detected
52
+ # IP address" of the VPN Server. You have to confirm the correctness
53
+ # beforehand.
54
+ #
55
+ # When you want to connect to the VPN Server by using TCP protocol,
56
+ # the port number of the destination TCP port should be same as one of
57
+ # the available TCP listeners on the VPN Server.
58
+ #
59
+ # When you use UDP protocol, the port number must same as the configuration
60
+ # setting of "OpenVPN Server Compatible Function" on the VPN Server.
61
+
62
+ remote vpn.transwarp.io 1194
63
+
64
+
65
+ ###############################################################################
66
+ # The HTTP/HTTPS proxy setting.
67
+ #
68
+ # Only if you have to use the Internet via a proxy, uncomment the below
69
+ # two lines and specify the proxy address and the port number.
70
+ # In the case of using proxy-authentication, refer the OpenVPN manual.
71
+
72
+ ;http-proxy-retry
73
+ ;http-proxy [proxy server] [proxy port]
74
+
75
+
76
+ ###############################################################################
77
+ # The encryption and authentication algorithm.
78
+ #
79
+ # Default setting is good. Modify it as you prefer.
80
+ # When you specify an unsupported algorithm, the error will occur.
81
+ #
82
+ # The supported algorithms are as follows:
83
+ # cipher: [NULL-CIPHER] NULL AES-128-CBC AES-192-CBC AES-256-CBC BF-CBC
84
+ # CAST-CBC CAST5-CBC DES-CBC DES-EDE-CBC DES-EDE3-CBC DESX-CBC
85
+ # RC2-40-CBC RC2-64-CBC RC2-CBC CAMELLIA-128-CBC CAMELLIA-192-CBC CAMELLIA-256-CBC
86
+ # auth: SHA SHA1 SHA256 SHA384 SHA512 MD5 MD4 RMD160
87
+
88
+ cipher AES-128-CBC
89
+ auth SHA1
90
+
91
+
92
+ ###############################################################################
93
+ # Other parameters necessary to connect to the VPN Server.
94
+ #
95
+ # It is not recommended to modify it unless you have a particular need.
96
+
97
+ resolv-retry infinite
98
+ nobind
99
+ persist-key
100
+ persist-tun
101
+ client
102
+ verb 3
103
+
104
+ route-nopull
105
+ route 172.16.0.0 255.255.0.0 vpn_gateway
106
+ route 172.17.0.0 255.255.0.0 vpn_gateway
107
+ route 172.18.0.0 255.255.0.0 vpn_gateway
108
+ route 172.26.0.0 255.255.0.0 vpn_gateway
109
+ dhcp-option DNS 172.16.20.11
110
+
111
+
112
+ ###############################################################################
113
+ # Authentication with credentials.
114
+ #
115
+ # Comment the line out in case you want to use the certificate authentication.
116
+
117
+ auth-user-pass
118
+
119
+
120
+ ###############################################################################
121
+ # The certificate file of the destination VPN Server.
122
+ #
123
+ # The CA certificate file is embedded in the inline format.
124
+ # You can replace this CA contents if necessary.
125
+ # Please note that if the server certificate is not a self-signed, you have to
126
+ # specify the signer's root certificate (CA) here.
127
+
128
+ <ca>
129
+ -----BEGIN CERTIFICATE-----
130
+ MIID3DCCAsSgAwIBAgIBADANBgkqhkiG9w0BAQsFADBtMR4wHAYDVQQDDBVsb2Nh
131
+ bGhvc3QubG9jYWxkb21haW4xHjAcBgNVBAoMFWxvY2FsaG9zdC5sb2NhbGRvbWFp
132
+ bjEeMBwGA1UECwwVbG9jYWxob3N0LmxvY2FsZG9tYWluMQswCQYDVQQGEwJVUzAe
133
+ Fw0xOTA1MjQwODI1MjdaFw0zNzEyMzEwODI1MjdaMG0xHjAcBgNVBAMMFWxvY2Fs
134
+ aG9zdC5sb2NhbGRvbWFpbjEeMBwGA1UECgwVbG9jYWxob3N0LmxvY2FsZG9tYWlu
135
+ MR4wHAYDVQQLDBVsb2NhbGhvc3QubG9jYWxkb21haW4xCzAJBgNVBAYTAlVTMIIB
136
+ IjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAxwXwz6tNW1O6c+KCmrwQLeom
137
+ VlqQB+w8vf6CMLTFdPJwFRIYNs+PfNJEXyHCPYnnuW7KvVZEECF87rDHtisAwznH
138
+ cJOYJy7zeeAznjeHcQoyUibrFzyi88d/tEEQS9NVOwejUzQy94oUWahFc/T/aPbv
139
+ P7NI+AT6vdhFb1eLPxp11fnKDOxn2jzBc0T1OIlWVFdZHtqXXDC8yjh+HfhV4FYG
140
+ TXMmXQiKAXwrxsJ+K1geyI/sDPjQ5SAy3aTXykFPgmgpJLFILqaQWnapCnhs9ZLi
141
+ gCvXsZNDKnWEj0aqPbF2T2e0Eq0hJ3E4XcjBQ5AkMXRnCg3LqNFKd2mbnyh3wwID
142
+ AQABo4GGMIGDMA8GA1UdEwEB/wQFMAMBAf8wCwYDVR0PBAQDAgH2MGMGA1UdJQRc
143
+ MFoGCCsGAQUFBwMBBggrBgEFBQcDAgYIKwYBBQUHAwMGCCsGAQUFBwMEBggrBgEF
144
+ BQcDBQYIKwYBBQUHAwYGCCsGAQUFBwMHBggrBgEFBQcDCAYIKwYBBQUHAwkwDQYJ
145
+ KoZIhvcNAQELBQADggEBACTBsdeiYKS4I85uT8zy8jMCiLDbRyZ+PVLZCxgp/lgr
146
+ rQ3O1lQ5lWURHTrDAqZrOcSSnhrjpadPtneTyuQ2SWERNoLMwwrNQYJv06A1AlqI
147
+ aCg4GFTKyISOU6aa76VpX1Lwp+XUd8hUdnln2gD29buvsMrD5/J4/zIhUVVzZ+LU
148
+ XIqIuePzBKLS3WKPfZa2vFYj2Oo3qPCyz4kASnZEElls/0tFMqHmFWoxt6U65+Hj
149
+ KEOg+7f0/12oY+jvuK5syNX/6aBgC+Lqafuit+ls3QuWPbG20DDxpHL0JSZAKsbB
150
+ WC2mi6NR6RmrubhyUGFNF1pzNjgH5RLETNmLVhCLUvo=
151
+ -----END CERTIFICATE-----
152
+
153
+ </ca>
154
+
155
+
156
+ ###############################################################################
157
+ # Client certificate and key.
158
+ #
159
+ # A pair of client certificate and private key is required in case you want to
160
+ # use the certificate authentication.
161
+ #
162
+ # To enable it, uncomment the lines below.
163
+ # Paste your certificate in the <cert> block and the key in the <key> one.
164
+
165
+ ;<cert>
166
+ ;-----BEGIN CERTIFICATE-----
167
+ ;
168
+ ;-----END CERTIFICATE-----
169
+ ;</cert>
170
+
171
+ ;<key>
172
+ ;-----BEGIN RSA PRIVATE KEY-----
173
+ ;
174
+ ;-----END RSA PRIVATE KEY-----
175
+ ;</key>
176
+
177
+