#management 172.16.1.1 7505 #management port if you need it dont use it if you dont know
#local you.could.bind.it.to.an.ip.here
port 1194
proto udp
dev tun0
persist-key
persist-tun
user nobody
group nogroup
keepalive 10 120
cipher AES-256-CBC # Blowfish (default)
comp-lzo
tls-auth keys/ta.key 0
ca keys/ca.crt
cert keys/server.crt
key keys/server.key # This file should be kept secret
dh keys/dh2048.pem
#crl-verify crl.pem ####For revokes
client-to-client
ifconfig-pool-persist clients.ipp.txt
###openvpn network ip range
server 172.16.1.0 255.255.255.0
###routes the client shall recieve aka which network shall he access
#i assumed your vhost network is 192.168.100.x
#imake 172.16.1.x as a network for openvpn clients in routed mode
push "route 172.16.1.0 255.255.255.0"
push "route 192.168.100.0 255.255.255.0"
push "dhcp-option DNS 10.10.100.1"
#push "dhcp-option WINS 10.10.200.1"
#setting up routes for irouting
#this is only if you have another network on your client side
#and you want that your vhost cant directly talk aka make a connection from vhost to clientside entwork
#aka site-to-site network, forst start keep it simple as a client-to-site network
#route 192.168.1.0 255.255.255.0
##########################################################
status /var/log/openvpn/openvpn-status.log
log-append /var/log/openvpn/openvpn-clients.log
verb 6
mute 20
#plugin /usr/lib/openvpn/openvpn-auth-pam.so ovpn #authplug if nessesary.
#chroot /etc/openvpn
client-config-dir /etc/openvpn/gate.saurid.com-clients
client
float
dev tun
proto udp
remote host.example.net 1194
resolv-retry infinite
nobind
#auth-user-pass
persist-key
persist-tun
;mute-replay-warnings
ns-cert-type server
cipher AES-256-CBC
comp-lzo
verb 3
;mute 20
ca ca.crt
cert client.crt
key client.key
tls-auth ta.key 1
auto tun0
iface tun0 inet static
address 172.16.1.1
netmask 255.255.255.255
network 172.16.1.2
pre-up openvpn --mktun --dev tun0
We use essential cookies to make this site work, and optional cookies to enhance your experience.