Office_Networks/WF/openvpn/wf/client-configs/christian.conf
2018-05-08 03:01:03 +02:00

271 lines
12 KiB
Plaintext

##############################################
# Sample client-side OpenVPN 2.0 config file #
# for connecting to multi-client server. #
# #
# This configuration can be used by multiple #
# clients, however each client should have #
# its own cert and key files. #
# #
# On Windows, you might want to rename this #
# file so it has a .ovpn extension #
##############################################
# Specify that we are a client and that we
# will be pulling certain config file directives
# from the server.
client
# Use the same setting as you are using on
# the server.
# On most systems, the VPN will not function
# unless you partially or fully disable
# the firewall for the TUN/TAP interface.
;dev tap
dev tun
# Are we connecting to a TCP or
# UDP server? Use the same setting as
# on the server
proto udp
# The hostname/IP and port of the server.
# You can have multiple remote entries
# to load balance between the servers.
remote wf.oopen.de 1194
topology subnet
# Keep trying indefinitely to resolve the
# host name of the OpenVPN server. Very useful
# on machines which are not permanently connected
# to the internet such as laptops.
resolv-retry infinite
# Most clients don't need to bind to
# a specific local port number.
nobind
# Try to preserve some state across restarts.
persist-key
persist-tun
# Server CA
<ca>
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
</ca>
# Client Certificate
<cert>
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
</cert>
# Client Key
<key>
-----BEGIN ENCRYPTED PRIVATE KEY-----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-----END ENCRYPTED PRIVATE KEY-----
</key>
# Verify server certificate by checking
# that the certicate has the nsCertType
# field set to "server". This is an
# important precaution to protect against
# a potential attack discussed here:
# http://openvpn.net/howto.html#mitm
#
# To use this feature, you will need to generate
# your server certificates with the nsCertType
# field set to "server". The build-key-server
# script in the easy-rsa folder will do this.
#
# Note!
# The option "ns-cert-type" has been deprecated since
# version 2.4 and will be removed from later distributions.
#
# Use the modern equivalent "remote-cert-tls"
#
;ns-cert-type server
remote-cert-tls server
# If a tls-auth key is used on the server
# then every client must also have the key.
#
# Don't forget to set the 'key-direction' Parameter if using
# Inline Key. Usualy , sever has key direction '0', while client
# has ke direction '1'.
#
key-direction 1
<tls-auth>
-----BEGIN OpenVPN Static key V1-----
055e6b31c205ec1ace25b0ef1f0b3e80
e74c454b9136ba2a73e77af7d1a69e27
961a2792f86003c7e5477606511ab117
86a4c648a987b4aed406d30bcf5c32b4
da5405b247161f9f1cafcb82df78f63e
e2151005472f97c913ab994c2b2fc3b0
2c8e2b7d9b466a1f092f375f2a08f561
b8e0c6bd019a5e9b9bc821715287f279
ca56cdd6fcbb3fde55d44da9be2ec86a
b81e52bc44f7c92174795dc12f95a6c1
beeca15154a9c72872c3f205ccf601ea
c610bd2aa828e052febb747c02cfdf4a
959e9a86a01863bebb30ed8f79d13dae
f58e8dde86d46026a27de24e6db51348
1d395e5736eab696c653d1f68a972dc1
e47de0993b8b5d57ecab103e70c4874a
-----END OpenVPN Static key V1-----
</tls-auth>
# Select a cryptographic cipher.
# If the cipher option is used on the server
# then you must also specify it here.
;cipher BF-CBC # Blowfish (default)
;cipher AES-128-CBC # AES
;cipher DES-EDE3-CBC # Triple-DES
cipher AES-256-CBC
# Enable compression on the VPN link.
# Don't enable this unless it is also
# enabled in the server config file.
;comp-lzo
# Verbosity level.
# 0 -- quiet except for fatal errors.
# 1 -- mostly quiet, but display non-fatal network errors.
# 3 -- medium output, good for normal operation.
# 9 -- verbose, good for troubleshooting
verb 1
# Setting 'pull' on the client takes care to get the 'push' durectives
# from the server
pull