Office_Networks/WF/openvpn/wf/client-configs/chris.conf
2018-05-08 03:01:03 +02:00

271 lines
12 KiB
Plaintext

##############################################
# Sample client-side OpenVPN 2.0 config file #
# for connecting to multi-client server. #
# #
# This configuration can be used by multiple #
# clients, however each client should have #
# its own cert and key files. #
# #
# On Windows, you might want to rename this #
# file so it has a .ovpn extension #
##############################################
# Specify that we are a client and that we
# will be pulling certain config file directives
# from the server.
client
# Use the same setting as you are using on
# the server.
# On most systems, the VPN will not function
# unless you partially or fully disable
# the firewall for the TUN/TAP interface.
;dev tap
dev tun
# Are we connecting to a TCP or
# UDP server? Use the same setting as
# on the server
proto udp
# The hostname/IP and port of the server.
# You can have multiple remote entries
# to load balance between the servers.
remote wf.oopen.de 1194
topology subnet
# Keep trying indefinitely to resolve the
# host name of the OpenVPN server. Very useful
# on machines which are not permanently connected
# to the internet such as laptops.
resolv-retry infinite
# Most clients don't need to bind to
# a specific local port number.
nobind
# Try to preserve some state across restarts.
persist-key
persist-tun
# Server CA
<ca>
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
</ca>
# Client Certificate
<cert>
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
</cert>
# Client Key
<key>
-----BEGIN ENCRYPTED PRIVATE KEY-----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-----END ENCRYPTED PRIVATE KEY-----
</key>
# Verify server certificate by checking
# that the certicate has the nsCertType
# field set to "server". This is an
# important precaution to protect against
# a potential attack discussed here:
# http://openvpn.net/howto.html#mitm
#
# To use this feature, you will need to generate
# your server certificates with the nsCertType
# field set to "server". The build-key-server
# script in the easy-rsa folder will do this.
#
# Note!
# The option "ns-cert-type" has been deprecated since
# version 2.4 and will be removed from later distributions.
#
# Use the modern equivalent "remote-cert-tls"
#
;ns-cert-type server
remote-cert-tls server
# If a tls-auth key is used on the server
# then every client must also have the key.
#
# Don't forget to set the 'key-direction' Parameter if using
# Inline Key. Usualy , sever has key direction '0', while client
# has ke direction '1'.
#
key-direction 1
<tls-auth>
-----BEGIN OpenVPN Static key V1-----
055e6b31c205ec1ace25b0ef1f0b3e80
e74c454b9136ba2a73e77af7d1a69e27
961a2792f86003c7e5477606511ab117
86a4c648a987b4aed406d30bcf5c32b4
da5405b247161f9f1cafcb82df78f63e
e2151005472f97c913ab994c2b2fc3b0
2c8e2b7d9b466a1f092f375f2a08f561
b8e0c6bd019a5e9b9bc821715287f279
ca56cdd6fcbb3fde55d44da9be2ec86a
b81e52bc44f7c92174795dc12f95a6c1
beeca15154a9c72872c3f205ccf601ea
c610bd2aa828e052febb747c02cfdf4a
959e9a86a01863bebb30ed8f79d13dae
f58e8dde86d46026a27de24e6db51348
1d395e5736eab696c653d1f68a972dc1
e47de0993b8b5d57ecab103e70c4874a
-----END OpenVPN Static key V1-----
</tls-auth>
# Select a cryptographic cipher.
# If the cipher option is used on the server
# then you must also specify it here.
;cipher BF-CBC # Blowfish (default)
;cipher AES-128-CBC # AES
;cipher DES-EDE3-CBC # Triple-DES
cipher AES-256-CBC
# Enable compression on the VPN link.
# Don't enable this unless it is also
# enabled in the server config file.
;comp-lzo
# Verbosity level.
# 0 -- quiet except for fatal errors.
# 1 -- mostly quiet, but display non-fatal network errors.
# 3 -- medium output, good for normal operation.
# 9 -- verbose, good for troubleshooting
verb 1
# Setting 'pull' on the client takes care to get the 'push' durectives
# from the server
pull