Openvpn mit benutzer auth
Zur Navigation springen
Zur Suche springen
Server installation
apt-get install openvpn
Zertifikate erstellen
make-pki.sh cert
und rüberkopieren
scp server.domain.tld.* klaus-ca.crt root@scorpia:/etc/openvpn/
cat /etc/openvpn/server.conf
dev tap mode server tls-server port 5005 ifconfig 192.168.1.1 255.255.255.0 ifconfig-pool 192.168.1.5 192.168.1.20 status /tmp/vpn.status keepalive 10 30 client-to-client max-clients 150 verb 3 dh /etc/openvpn/dh1024.pem ca /etc/openvpn/klaus-ca.crt cert /etc/openvpn/server.domain.tld.crt key /etc/openvpn/server.domain.tldkey comp-lzo persist-key persist-tun duplicate-cn plugin /usr/lib/openvpn/openvpn-auth-pam.so /etc/pam.d/login
cat /etc/openvpn/server.conf
dev tap tls-client proto udp remote server.domain.tld port 5005 persist-key persist-tun comp-lzo ca /etc/openvpn/ca.crt dh /etc/openvpn/dh1024.pem cert /etc/openvpn/certsrv.crt key /etc/openvpn/certsrv.key auth-user-pass route 192.168.240.0 255.255.240.0 192.168.1.1 pull