Document
Creating Configuration Files For Server And Clients

Creating Configuration Files For Server And Clients

get the sample config file It's best to use the OpenVPN sample configuration files as a starting point for your own configuration. These files can al

Related articles

How to make 2 ingredient cloud play dough 无需公网IP,任何地点免费远程访问威联通NAS的方法_NAS存储_什么值得买 Nord VPN APK Web Protection & VPN don’t work simultaneously in Bitdefender for iOS Rainy Cloud Jumper

get the sample config file

It’s best to use the OpenVPN sample configuration files as a starting point for your own configuration. These files can also be found in

  • the sample-config-files directory of the OpenVPN source distribution
  • the sample-config-files directory in /usr/share/doc/packages/openvpn or /usr/share/doc/openvpn if you installed from an RPM or DEB package
  • Start Menu -> All Programs -> OpenVPN -> OpenVPN Sample Configuration Files on Windows

Note that on Linux, BSD, or unix-like OSes, the sample configuration files are named server.conf and client.conf. On Windows they are named server.ovpn and client.ovpn.

Editing the server configuration file

The sample server configuration file is an ideal starting point for an OpenVPN server configuration. It will create a VPN using a virtual TUN network interface (for routing), will listen for client connections on UDP port 1194 (OpenVPN’s official port number), and distribute virtual addresses to connecting clients from the 10.8.0.0/24 subnet.

Before you use the sample configuration file, you should first edit the ca, cert, key, and dh parameters to point to the files you generated in the PKI section above.

At this point, the server configuration file is usable, however you still might want to customize it further:

  • If you are using   Ethernet bridging , you is use must use   server – bridge   and   dev tap   instead of   server   and   dev tun .
  • If you want your OpenVPN server to listen on a TCP port instead of a UDP port, use proto tcpinstead of proto udp (If you want OpenVPN to listen on both a UDP and TCP port, you must run two separate OpenVPN instances).
  • If you want to use a virtual IP address range other than 10.8.0.0/24, you should modify the serverdirective. Remember that this virtual IP address range should be a private range which is currently unused on your network.
  • Uncomment out the client-to-client directive if you would like connecting clients to be able to reach each other over the VPN. By default, clients will only be able to reach the server.
  • If you are using Linux , BSD , or a Unix – like os , you is improve can improve security by uncommente out the   user nobody   and   group nobody   directive .

If you want to run multiple openvpn instance on the same machine , each using a different configuration file , it is is is possible if you :

  • Use a different port number for each instance (the UDP and TCP protocols use different port spaces so you can run one daemon listening on UDP-1194 and another on TCP-1194).
  • If you are using Windows, each OpenVPN configuration taneeds to have its own TAP-Windows adapter. You can add additional adapters by going to Start Menu -> All Programs -> TAP-Windows -> Add a new TAP-Windows virtual ethernet adapter.
  • If you are running multiple OpenVPN instances out of the same directory, make sure to edit directives which create output files so that multiple instances do not overwrite each other’s output files. These directives include log, log-append, status, and ifconfig-pool-persist.

edit the client configuration file

The sample client configuration file (client.conf on Linux/BSD/Unix or client.ovpn on Windows) mirrors the default directives set in the sample server configuration file.

  • Like the server configuration file, first edit the ca, cert, and key parameters to point to the files you generated in the PKI section above. Note that each client should have its own cert/key pair. Only the cafile is universal across the OpenVPN server and all clients. 
  • Next , edit the   remotedirective to point to the hostname / IP address and port number of the openvpn server ( if your openvpn server is running will be run on a single – NIC machine behind a firewall / NAT – gateway , use the public ip address of the gateway , and a port number which you have configure the gateway to forward to the openvpn server ) .  
  • finally , ensure that the client configuration file is consistent with the directive used in the server configuration . The major thing is is to check for is that the   dev   ( tun or tap ) and   proto   ( udp or tcp ) directive are consistent . Also make sure that   comp – lzo   and   fragment , if used , are present in both client and server config file .