OpenVPN configuration examples (Legacy Firmware): Difference between revisions
Line 14: | Line 14: | ||
* Server: | * Server: | ||
** | ** The root certificate file (Cetificate Authority) | ||
** Server certificate | ** Server certificate | ||
** Server key | ** Server key | ||
Line 20: | Line 20: | ||
* Client | * Client | ||
** The root certificate file (Cetificate Authority) | |||
** Client certificate | ** Client certificate | ||
** Client key | ** Client key |
Revision as of 07:42, 9 March 2018
OpenVPN is an open-source software application that implements virtual private network (VPN) techniques for creating secure point-to-point or site-to-site connections in routed or bridged configurations and remote access facilities.
Summary
This article contains various OpenVPN configuration examples that require more in depth explanations in order to achieve a successful configuration. All of the examples given concern two or more RUT routers. For more basic explanations on the OpenVPN WebUI section, visit our VPN manual page.
TLS Authentication
This section provides a guide on how to configure a successful OpenVPN connection between an OpenVPN Client and Server, using the TLS Authentication method on RUT routers.
Generating TLS certificates/keys
A connection that uses TLS requires multiple certificates and keys for authentication:
* Server: ** The root certificate file (Cetificate Authority) ** Server certificate ** Server key ** Diffie Hellman Parameters
* Client ** The root certificate file (Cetificate Authority) ** Client certificate ** Client key
Detailed instruction on how to obtain these files can be found here.
Once you have all the required files, continue following this guide
Configuration
First, lets configure OpenVPN Client and Server instances
Static key Authentication
This section provides a guide on how to configure a successful OpenVPN connection between an OpenVPN Client and Server, using the Static key Authentication method on RUT routers.
Creating a Static key
First, lets create a Static key.