Office_Networks/WF/openvpn/wf/client-configs/lalix.conf
2018-05-08 03:01:03 +02:00

271 lines
12 KiB
Plaintext

##############################################
# Sample client-side OpenVPN 2.0 config file #
# for connecting to multi-client server. #
# #
# This configuration can be used by multiple #
# clients, however each client should have #
# its own cert and key files. #
# #
# On Windows, you might want to rename this #
# file so it has a .ovpn extension #
##############################################
# Specify that we are a client and that we
# will be pulling certain config file directives
# from the server.
client
# Use the same setting as you are using on
# the server.
# On most systems, the VPN will not function
# unless you partially or fully disable
# the firewall for the TUN/TAP interface.
;dev tap
dev tun
# Are we connecting to a TCP or
# UDP server? Use the same setting as
# on the server
proto udp
# The hostname/IP and port of the server.
# You can have multiple remote entries
# to load balance between the servers.
remote wf.oopen.de 1194
topology subnet
# Keep trying indefinitely to resolve the
# host name of the OpenVPN server. Very useful
# on machines which are not permanently connected
# to the internet such as laptops.
resolv-retry infinite
# Most clients don't need to bind to
# a specific local port number.
nobind
# Try to preserve some state across restarts.
persist-key
persist-tun
# Server CA
<ca>
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
</ca>
# Client Certificate
<cert>
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
</cert>
# Client Key
<key>
-----BEGIN ENCRYPTED PRIVATE KEY-----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-----END ENCRYPTED PRIVATE KEY-----
</key>
# Verify server certificate by checking
# that the certicate has the nsCertType
# field set to "server". This is an
# important precaution to protect against
# a potential attack discussed here:
# http://openvpn.net/howto.html#mitm
#
# To use this feature, you will need to generate
# your server certificates with the nsCertType
# field set to "server". The build-key-server
# script in the easy-rsa folder will do this.
#
# Note!
# The option "ns-cert-type" has been deprecated since
# version 2.4 and will be removed from later distributions.
#
# Use the modern equivalent "remote-cert-tls"
#
;ns-cert-type server
remote-cert-tls server
# If a tls-auth key is used on the server
# then every client must also have the key.
#
# Don't forget to set the 'key-direction' Parameter if using
# Inline Key. Usualy , sever has key direction '0', while client
# has ke direction '1'.
#
key-direction 1
<tls-auth>
-----BEGIN OpenVPN Static key V1-----
055e6b31c205ec1ace25b0ef1f0b3e80
e74c454b9136ba2a73e77af7d1a69e27
961a2792f86003c7e5477606511ab117
86a4c648a987b4aed406d30bcf5c32b4
da5405b247161f9f1cafcb82df78f63e
e2151005472f97c913ab994c2b2fc3b0
2c8e2b7d9b466a1f092f375f2a08f561
b8e0c6bd019a5e9b9bc821715287f279
ca56cdd6fcbb3fde55d44da9be2ec86a
b81e52bc44f7c92174795dc12f95a6c1
beeca15154a9c72872c3f205ccf601ea
c610bd2aa828e052febb747c02cfdf4a
959e9a86a01863bebb30ed8f79d13dae
f58e8dde86d46026a27de24e6db51348
1d395e5736eab696c653d1f68a972dc1
e47de0993b8b5d57ecab103e70c4874a
-----END OpenVPN Static key V1-----
</tls-auth>
# Select a cryptographic cipher.
# If the cipher option is used on the server
# then you must also specify it here.
;cipher BF-CBC # Blowfish (default)
;cipher AES-128-CBC # AES
;cipher DES-EDE3-CBC # Triple-DES
cipher AES-256-CBC
# Enable compression on the VPN link.
# Don't enable this unless it is also
# enabled in the server config file.
;comp-lzo
# Verbosity level.
# 0 -- quiet except for fatal errors.
# 1 -- mostly quiet, but display non-fatal network errors.
# 3 -- medium output, good for normal operation.
# 9 -- verbose, good for troubleshooting
verb 1
# Setting 'pull' on the client takes care to get the 'push' durectives
# from the server
pull