Office_Networks/WF/openvpn/wf/client-configs/kaya.conf
2018-05-08 03:01:03 +02:00

271 lines
12 KiB
Plaintext

##############################################
# Sample client-side OpenVPN 2.0 config file #
# for connecting to multi-client server. #
# #
# This configuration can be used by multiple #
# clients, however each client should have #
# its own cert and key files. #
# #
# On Windows, you might want to rename this #
# file so it has a .ovpn extension #
##############################################
# Specify that we are a client and that we
# will be pulling certain config file directives
# from the server.
client
# Use the same setting as you are using on
# the server.
# On most systems, the VPN will not function
# unless you partially or fully disable
# the firewall for the TUN/TAP interface.
;dev tap
dev tun
# Are we connecting to a TCP or
# UDP server? Use the same setting as
# on the server
proto udp
# The hostname/IP and port of the server.
# You can have multiple remote entries
# to load balance between the servers.
remote wf.oopen.de 1194
topology subnet
# Keep trying indefinitely to resolve the
# host name of the OpenVPN server. Very useful
# on machines which are not permanently connected
# to the internet such as laptops.
resolv-retry infinite
# Most clients don't need to bind to
# a specific local port number.
nobind
# Try to preserve some state across restarts.
persist-key
persist-tun
# Server CA
<ca>
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
</ca>
# Client Certificate
<cert>
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
</cert>
# Client Key
<key>
-----BEGIN ENCRYPTED PRIVATE KEY-----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-----END ENCRYPTED PRIVATE KEY-----
</key>
# Verify server certificate by checking
# that the certicate has the nsCertType
# field set to "server". This is an
# important precaution to protect against
# a potential attack discussed here:
# http://openvpn.net/howto.html#mitm
#
# To use this feature, you will need to generate
# your server certificates with the nsCertType
# field set to "server". The build-key-server
# script in the easy-rsa folder will do this.
#
# Note!
# The option "ns-cert-type" has been deprecated since
# version 2.4 and will be removed from later distributions.
#
# Use the modern equivalent "remote-cert-tls"
#
;ns-cert-type server
remote-cert-tls server
# If a tls-auth key is used on the server
# then every client must also have the key.
#
# Don't forget to set the 'key-direction' Parameter if using
# Inline Key. Usualy , sever has key direction '0', while client
# has ke direction '1'.
#
key-direction 1
<tls-auth>
-----BEGIN OpenVPN Static key V1-----
055e6b31c205ec1ace25b0ef1f0b3e80
e74c454b9136ba2a73e77af7d1a69e27
961a2792f86003c7e5477606511ab117
86a4c648a987b4aed406d30bcf5c32b4
da5405b247161f9f1cafcb82df78f63e
e2151005472f97c913ab994c2b2fc3b0
2c8e2b7d9b466a1f092f375f2a08f561
b8e0c6bd019a5e9b9bc821715287f279
ca56cdd6fcbb3fde55d44da9be2ec86a
b81e52bc44f7c92174795dc12f95a6c1
beeca15154a9c72872c3f205ccf601ea
c610bd2aa828e052febb747c02cfdf4a
959e9a86a01863bebb30ed8f79d13dae
f58e8dde86d46026a27de24e6db51348
1d395e5736eab696c653d1f68a972dc1
e47de0993b8b5d57ecab103e70c4874a
-----END OpenVPN Static key V1-----
</tls-auth>
# Select a cryptographic cipher.
# If the cipher option is used on the server
# then you must also specify it here.
;cipher BF-CBC # Blowfish (default)
;cipher AES-128-CBC # AES
;cipher DES-EDE3-CBC # Triple-DES
cipher AES-256-CBC
# Enable compression on the VPN link.
# Don't enable this unless it is also
# enabled in the server config file.
;comp-lzo
# Verbosity level.
# 0 -- quiet except for fatal errors.
# 1 -- mostly quiet, but display non-fatal network errors.
# 3 -- medium output, good for normal operation.
# 9 -- verbose, good for troubleshooting
verb 1
# Setting 'pull' on the client takes care to get the 'push' durectives
# from the server
pull